Server Component Details | End Points used |
Domain: esignet-insurance.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/auth-code
Domain: api-internal.released.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/issuers/configuration
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/binding-otp
Domain: api-internal.released.mosip.net ---- Module: idgenerator ---- End Point: v1/idgenerator/uin
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/users/me
Domain: api-internal.released.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies
Domain: esignet-insurance.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/v2/oauth-details
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/issuers/Mosip
Domain: api-internal.released.mosip.net ---- Module: idrepository ---- End Point: idrepository/v1/identity/
Domain: api-internal.released.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/certificate/ca/upload
Domain: api-internal.released.mosip.net ---- Module: masterdata ---- End Point: v1/masterdata/actuator/health
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/credentials/download
Domain: api-internal.released.mosip.net ---- Module: masterdata ---- End Point: v1/masterdata/actuator/env
Domain: esignet-mosipid.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/authenticate
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/actuator/env
Domain: api-internal.released.mosip.net ---- Module: idrepository ---- End Point: idrepository/v1/vid
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallets
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/issuers/invalid
Domain: api-internal.released.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/certificate/upload
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/verifiers
Domain: api-internal.released.mosip.net ---- Module: authmanager ---- End Point: v1/authmanager/authenticate/clientidsecretkey
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallets/{walletId}/credentials/{credentialId}
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/issuers/{issuerId}/well-known-proxy
Domain: api-internal.released.mosip.net ---- Module: idrepository ---- End Point: idrepository/v1/identity/actuator/health
Domain: api-internal.released.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/publish
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallets/{walletId}
Domain: esignet-mosipid.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/actuator/env
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallets/{walletId}/unlock
Domain: api-internal.released.mosip.net ---- Module: authmanager ---- End Point: v1/authmanager/authenticate/internal/useridPwd
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/auth/invalid/token-login
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/auth/google/token-login
Domain: esignet-insurance.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/authenticate
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/logout
Domain: esignet-mosipid.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/send-otp
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallet-binding
Domain: api-internal.released.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/
Domain: esignet-mosipid.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/v2/oauth-details
Domain: api-internal.released.mosip.net ---- Module: masterdata ---- End Point: v1/masterdata/idschema/latest
Domain: esignet-mosipid.released.mosip.net ---- Module: esignet ---- End Point: v1/esignet/authorization/auth-code
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallets/{walletId}/credentials
Domain: api-internal.released.mosip.net ---- Module: idrepository ---- End Point: idrepository/v1/actuator/health
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/issuers
Domain: api-internal.released.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/new
Domain: api-internal.released.mosip.net ---- Module: idauthentication ---- End Point: idauthentication/v1/actuator/env
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=invalid
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=download
Domain: api-internal.qa-inji1.mosip.net ---- Module: mimoto ---- End Point: v1/mimoto/issuers/Mosip/configuration | ||||||
|---|---|---|---|---|---|---|---|---|
Server Errors No server errors | ||||||||
Captcha Enabled false | ||||||||
| Mimoto Pre-requisite API Test ---- Report Date: 2025-09-16 ---- Tested Environment: qa-inji1 ---- Commit Id is: 286b73fc & Branch Name is:release-0.19.x | ||||||||
| Test Scenario | # Total | # Passed | # Skipped | # Failed | # Ignored | # Known_Issues | Execution Time (HH:MM:SS) | |
| Adding Identity | 4 | 4 | 0 | 0 | 0 | 0 | 00:01:39 | |
| GenerateVID | 6 | 0 | 0 | 0 | 6 | 0 | 00:00:01 | |
| CreateVID | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:04 | |
| Mimoto API Test ---- Report Date: 2025-09-16 ---- Tested Environment: qa-inji1 ---- Commit Id is: 286b73fc & Branch Name is:release-0.19.x | ||||||||
| Test Scenario | # Total | # Passed | # Skipped | # Failed | # Ignored | # Known_Issues | Execution Time (HH:MM:SS) | |
| CreatePolicySunBirdR | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPolicySunBirdR | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| SearchPolicySunBirdR | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| OAuthDetailsRequest | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuthenticateUser | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:22 | |
| AuthorizationCode | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| OAuthDetailsRequestSunBirdC | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuthenticateUserSunBirdC | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuthorizationCodeSunBirdC | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DownloadIssuerCredential | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:14 | |
| AuthLock | 6 | 0 | 0 | 0 | 6 | 0 | 00:00:01 | |
| AuthUnLock | 4 | 0 | 0 | 0 | 4 | 0 | 00:00:01 | |
| RequestCredentials | 6 | 0 | 0 | 0 | 6 | 0 | 00:00:01 | |
| CredentialCheckStatus | 3 | 0 | 0 | 0 | 3 | 0 | 00:00:01 | |
| DownloadCredential | 2 | 0 | 0 | 0 | 2 | 0 | 00:00:01 | |
| SendOTP | 1 | 0 | 0 | 0 | 1 | 0 | 00:00:01 | |
| AidGetIndividualId | 5 | 0 | 0 | 0 | 5 | 0 | 00:00:01 | |
| BindingOtp | 36 | 35 | 0 | 0 | 0 | 1 | 00:00:04 | |
| WalletBinding | 78 | 77 | 0 | 0 | 0 | 1 | 00:03:10 | |
| GetAllIssuers | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetIssuerWellKnown | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GoogleLoginToken | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetUserProfile | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreateWallet | 22 | 22 | 0 | 0 | 0 | 0 | 00:00:03 | |
| UnlockWallet | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| OAuthDetailsRequestForGoogleLogin | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuthenticateUserForGoogleLogin | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:23 | |
| AuthorizationCodeForGoogleLogin | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DownloadMosipIssuerCredentialWithGoogleLogin | 40 | 39 | 0 | 0 | 0 | 1 | 00:00:07 | |
| OAuthDetailsRequestSunBirdCForGoogleLogin | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuthenticateUserSunBirdCForGoogleLogin | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuthorizationCodeSunBirdCForGoogleLogin | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DownloadIssuerCredentialWithGoogleLogin | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:04 | |
| FetchAllCredentials | 7 | 6 | 0 | 0 | 0 | 1 | 00:00:01 | |
| ViewCredential | 18 | 18 | 0 | 0 | 0 | 0 | 00:00:10 | |
| DeleteCredentials | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetWallets | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:08 | |
| UnlockWalletForTemporarilyLock | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeleteWallet | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UnlockWalletAfterDelete | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| Logout | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetUserProfileAfterLogout | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ViewCredentialAfterLogout | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeletePolicySunBirdR | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetVerifierList | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetIssuerConfiguration | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| Total | 316 | 279 | 0 | 0 | 33 | 4 | 00:06:42 | |
| TestCase Number | TestCase Description | Execution Time (HH:MM:SS) |
|---|---|---|
| Adding Identity — Passed | ||
| TC_Mimoto_AddIdentity_02 | Creating a new identity with all valid parameters for Binding APIs | 00:00:01 |
| TC_Mimoto_AddIdentity_03 | Creating a new identity for downloading issuer credential | 00:00:02 |
| TC_Mimoto_AddIdentity_03 | Creating a new identity for downloading issuer credential | 00:00:02 |
| TC_Mimoto_AddIdentity_01 | Creating a new identity with all valid parameters | 00:00:03 |
| GenerateVID — Ignored | ||
| TC_Mimoto_GenerateVID_06 | Creating perpetual VID with binding valid request | 00:00:01 |
| TC_Mimoto_GenerateVID_02 | Creating Perpetual VID with invalid OTP | 00:00:00 |
| TC_Mimoto_GenerateVID_05 | Creating perpetual VID with invalid transactionID | 00:00:00 |
| TC_Mimoto_GenerateVID_01 | Creating Perpetual VID with all valid parameters | 00:00:01 |
| TC_Mimoto_GenerateVID_03 | Creating Perpetual VID with invalid UIN | 00:00:00 |
| TC_Mimoto_GenerateVID_04 | Creating temporary VID with all valid request | 00:00:00 |
| CreateVID — Passed | ||
| TC_Mimoto_GenerateVID_06 | Create perpetual VID for binding with valid details | 00:00:01 |
| TC_Mimoto_GenerateVID_01 | Create perpetual VID with valid details | 00:00:01 |
| TC_Mimoto_GenerateVID_04 | Create temporary VID with valid details | 00:00:01 |
| CreatePolicySunBirdR — Passed | ||
| TC_Mimoto_CreatePolicySunBirdR_01 | Creating new sunbird policy with valid parameters | 00:00:01 |
| GetPolicySunBirdR — Passed | ||
| TC_Mimoto_GetPolicySunBirdR_01 | Getting sunbird policy with valid parameters | 00:00:01 |
| SearchPolicySunBirdR — Passed | ||
| TC_Mimoto_SearchPolicySunBirdR_01 | Searching sunbird policy with valid parameters | 00:00:01 |
| OAuthDetailsRequest — Passed | ||
| TC_Mimoto_OAuthDetailsRequest_01 | Creating Oauth's details with all valid parameters | 00:00:01 |
| AuthenticateUser — Passed | ||
| TC_Mimoto_AuthenticateUser_01 | Authenticate user to download credentials with all valid parameters | 00:00:22 |
| AuthorizationCode — Passed | ||
| TC_Mimoto_AuthorizationCode_01 | Generate authorization code to download credential issuer | 00:00:01 |
| OAuthDetailsRequestSunBirdC — Passed | ||
| TC_Mimoto_OAuthDetailsRequestSunBirdC_01 | Getting auth details for downloading sunbird credentials | 00:00:01 |
| AuthenticateUserSunBirdC — Passed | ||
| TC_Mimoto_AuthenticateUserSunBirdC_01 | Authenticating user for downloading sunbird credential | 00:00:01 |
| AuthorizationCodeSunBirdC — Passed | ||
| TC_Mimoto_AuthorizationCodeSunBirdC_01 | Generating authorization code for downloading sunbird VC | 00:00:01 |
| DownloadIssuerCredential — Passed | ||
| TC_Mimoto_DownloadIssuerCredential_04 | Downloading credential with invalid credential AuthorizationCode | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredential_03 | Downloading credential with invalid credential | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredential_02 | Downloading credential with invalid issuer | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredential_01 | Downloading credential with all valid parameters | 00:00:07 |
| TC_Mimoto_DownloadIssuerCredential_06 | Downloading sunbird credential with valid authorizationCode | 00:00:06 |
| TC_Mimoto_DownloadIssuerCredential_05 | Downloading credential with invalid expired authorizationCode | 00:00:01 |
| AuthLock — Ignored | ||
| TC_Mimoto_AuthLock_02 | Auth Lock a particular UIN with invalid OTP | 00:00:00 |
| TC_Mimoto_AuthLock_01 | Auth lock a particular UIN with valid parameters | 00:00:00 |
| TC_Mimoto_AuthLock_04 | Auth lock a particular VID with valid VID | 00:00:00 |
| TC_Mimoto_AuthLock_06 | Auth lock a particular VID with invalid VID | 00:00:00 |
| TC_Mimoto_AuthLock_03 | Auth Lock a particular UIN with valid OTP | 00:00:00 |
| TC_Mimoto_AuthLock_05 | Auth lock a particular VID with invalid OTP | 00:00:01 |
| AuthUnLock — Ignored | ||
| TC_Mimoto_AuthLock_10 | Unlock a particular VID with invalid OTP | 00:00:00 |
| TC_Mimoto_AuthLock_07 | Auth unlock a particular UIN with valid parameters | 00:00:01 |
| TC_Mimoto_AuthLock_08 | Auth unlock a particular VID with valid parameters | 00:00:00 |
| TC_Mimoto_AuthLock_09 | Auth unlock a particular UIN with invalid OTP | 00:00:00 |
| RequestCredentials — Ignored | ||
| TC_Mimoto_RequestCredentials_02 | requesting credential with valid VID | 00:00:00 |
| TC_Mimoto_RequestCredentials_03 | requesting UIN credential with invalid OTP | 00:00:00 |
| TC_Mimoto_RequestCredentials_04 | requesting credential with invalid transactionID | 00:00:00 |
| TC_Mimoto_RequestCredentials_05 | requesting credential with invalid UIN | 00:00:00 |
| TC_Mimoto_RequestCredentials_06 | requesting credential with invalid VID | 00:00:01 |
| TC_Mimoto_RequestCredentials_01 | requesting credential with all valid parameters | 00:00:01 |
| CredentialCheckStatus — Ignored | ||
| TC_Mimoto_CredentialsStatus_01 | Retrieving credential status with valid UIN | 00:00:01 |
| TC_Mimoto_CreateVID_03 | Retrieving credential status with invalid requestId | 00:00:01 |
| TC_Mimoto_CredentialsStatus_02 | Retrieving credential status with valid VID | 00:00:00 |
| DownloadCredential — Ignored | ||
| TC_Mimoto_DownloadCredential_01 | Checking credential status with all valid parameters | 00:00:01 |
| TC_Mimoto_DownloadCredential_02 | Checking credential status with invalid StatusCode | 00:00:00 |
| SendOTP — Ignored | ||
| TC_Mimoto_individualOTP_01 | generating individual OTP with valid parameters | 00:00:00 |
| AidGetIndividualId — Ignored | ||
| TC_Mimoto_AidGetIndividualId_02 | Generating individualID with invalid AID | 00:00:00 |
| TC_Mimoto_AidGetIndividualId_03 | Generating individualID with Invalid OTP | 00:00:00 |
| TC_Mimoto_AidGetIndividualId_05 | Generating individualID with invalid lengh of AID | 00:00:00 |
| TC_Mimoto_AidGetIndividualId_04 | Generating individualID with valid OTP | 00:00:00 |
| TC_Mimoto_AidGetIndividualId_01 | Generating AID status with valid AID | 00:00:00 |
| BindingOtp — known_issues | ||
| TC_Mimoto_BindingOtp_02 | Creating OTP for binding a individualID with valid VID | 00:00:01 |
| BindingOtp — Passed | ||
| TC_Mimoto_BindingOtp_13 | Creating OTP for binding a individualID with OTP channel being empty | 00:00:01 |
| TC_Mimoto_BindingOtp_10 | Creating OTP for binding a individualID with OTP channel being empty | 00:00:01 |
| TC_Mimoto_BindingOtp_19 | Creating OTP for binding a individualID with empty request time | 00:00:01 |
| TC_Mimoto_BindingOtp_05 | Creating OTP for binding a individualID with individualId missing | 00:00:01 |
| TC_Mimoto_BindingOtp_17 | Creating OTP for binding a individualID with future request time | 00:00:01 |
| TC_Mimoto_BindingOtp_08 | Creating OTP for binding a individualID with invalid OTP channel | 00:00:01 |
| TC_Mimoto_AuthLock_07 | Creating OTP for binding a individualID with invalid request time | 00:00:01 |
| TC_Mimoto_BindingOtp_03 | Creating OTP for binding a individualID with invalid UIN | 00:00:01 |
| TC_Mimoto_BindingOtp_12 | Creating OTP for binding a individualID with OTP channel missing | 00:00:01 |
| TC_Mimoto_BindingOtp_09 | Creating OTP for binding a individualID with OTP channel missing | 00:00:01 |
| TC_Mimoto_BindingOtp_18 | Creating OTP for binding a individualID with missing request time | 00:00:01 |
| TC_Mimoto_BindingOtp_04 | Creating OTP for binding a individualID without individualId attribute | 00:00:01 |
| TC_Mimoto_BindingOtp_14 | Creating OTP for binding a individualID with OTP channel being empty | 00:00:01 |
| TC_Mimoto_BindingOtp_11 | Creating OTP for binding a individualID with OTP channel value being null | 00:00:01 |
| TC_Mimoto_BindingOtp_06 | Creating OTP for binding a individualID with individualId value as null | 00:00:01 |
| TC_Mimoto_BindingOtp_16 | Creating OTP for binding a individualID with past request time | 00:00:01 |
| TC_Mimoto_BindingOtp_07 | Creating OTP for binding a individualID with OTP channel value been spaced in between | 00:00:01 |
| TC_Mimoto_BindingOtp_01 | Creating OTP for binding a individualID with valid UIN | 00:00:01 |
| TC_Mimoto_BindingOtp_30 | Creating OTP for binding a VID with OTP channel values empty | 00:00:01 |
| TC_Mimoto_BindingOtp_27 | Creating OTP for binding a VID with empty OTP channel values | 00:00:01 |
| TC_Mimoto_BindingOtp_36 | Creating OTP for binding a VID with request time empty | 00:00:01 |
| TC_Mimoto_BindingOtp_22 | Creating OTP for binding a individualID with empty VID | 00:00:01 |
| TC_Mimoto_BindingOtp_34 | Creating OTP for binding a VID with future request time | 00:00:01 |
| TC_Mimoto_BindingOtp_25 | Creating OTP for binding a VID with invalid OTP channel | 00:00:01 |
| TC_Mimoto_BindingOtp_32 | Creating OTP for binding a VID with invalid request time | 00:00:01 |
| TC_Mimoto_BindingOtp_20 | Creating OTP for binding a individualID with invalid VID | 00:00:01 |
| TC_Mimoto_BindingOtp_29 | Creating OTP for binding a VID with OTP channel values missing | 00:00:01 |
| TC_Mimoto_BindingOtp_26 | Creating OTP for binding a VID with missing OTP channel values | 00:00:01 |
| TC_Mimoto_BindingOtp_35 | Creating OTP for binding a VID with request time missing | 00:00:01 |
| TC_Mimoto_BindingOtp_21 | Creating OTP for binding a individualID with missing VID | 00:00:01 |
| TC_Mimoto_BindingOtp_31 | Creating OTP for binding a VID with OTP channel values as null | 00:00:01 |
| TC_Mimoto_BindingOtp_28 | Creating OTP for binding a VID with OTP channel values as null | 00:00:01 |
| TC_Mimoto_BindingOtp_23 | Creating OTP for binding a individualID with invalid VID | 00:00:01 |
| TC_Mimoto_BindingOtp_33 | Creating OTP for binding a VID with past request time | 00:00:01 |
| TC_Mimoto_BindingOtp_24 | Creating OTP for binding a VID with OTP channel value been spaced in between | 00:00:01 |
| WalletBinding — known_issues | ||
| TC_Mimoto_WalletBinding_02 | Generating OTP to bind VC with valid VID | 00:00:00 |
| WalletBinding — Passed | ||
| TC_Mimoto_WalletBinding_14 | Generating OTP to bind VC with empty authfactortype | 00:00:01 |
| TC_Mimoto_WalletBinding_20 | Generating OTP to bind VC with empty challenge | 00:00:02 |
| TC_Mimoto_WalletBinding_25 | Generating OTP to bind VC with empty formate | 00:00:01 |
| TC_Mimoto_WalletBinding_09 | Generating OTP to bind VC with empty individualId | 00:00:01 |
| TC_Mimoto_WalletBinding_06 | Generating OTP to bind VC with empty requestime | 00:00:01 |
| TC_Mimoto_WalletBinding_30 | Generating OTP to bind VC with empty authFactorType1 | 00:00:01 |
| TC_Mimoto_WalletBinding_35 | Generating OTP to bind VC with empty format1 | 00:00:02 |
| TC_Mimoto_WalletBinding_05 | Generating OTP to bind VC with future request time | 00:00:01 |
| TC_Mimoto_WalletBinding_13 | Generating OTP to bind VC with invalid authfactortype | 00:00:01 |
| TC_Mimoto_WalletBinding_18 | Generating OTP to bind VC with invalid challenge | 00:00:01 |
| TC_Mimoto_WalletBinding_23 | Generating OTP to bind VC with invalid formate | 00:00:02 |
| TC_Mimoto_WalletBinding_08 | Generating OTP to bind VC with invalid individualId | 00:00:02 |
| TC_Mimoto_WalletBinding_03 | Generating OTP to bind VC with invalid request time | 00:00:01 |
| TC_Mimoto_WalletBinding_28 | Generating OTP to bind VC with invalid authFactorType1 | 00:00:01 |
| TC_Mimoto_WalletBinding_33 | Generating OTP to bind VC with invalid format1 | 00:00:01 |
| TC_Mimoto_WalletBinding_38 | Generating OTP to bind VC with invalid publickey | 00:00:12 |
| TC_Mimoto_WalletBinding_15 | Generating OTP to bind VC with missing authfactortype | 00:00:01 |
| TC_Mimoto_WalletBinding_19 | Generating OTP to bind VC with missing challenge | 00:00:02 |
| TC_Mimoto_WalletBinding_24 | Generating OTP to bind VC with missing formate | 00:00:02 |
| TC_Mimoto_WalletBinding_11 | Generating OTP to bind VC with individualId being missing | 00:00:02 |
| TC_Mimoto_WalletBinding_07 | Generating OTP to bind VC with missing requestime | 00:00:01 |
| TC_Mimoto_WalletBinding_29 | Generating OTP to bind VC with missing authFactorType1 | 00:00:01 |
| TC_Mimoto_WalletBinding_34 | Generating OTP to bind VC with missing format1 | 00:00:01 |
| TC_Mimoto_WalletBinding_40 | Generating OTP to bind VC with missing publickey | 00:00:11 |
| TC_Mimoto_WalletBinding_17 | Generating OTP to bind VC with authfactortype value being just null | 00:00:01 |
| TC_Mimoto_WalletBinding_22 | Generating OTP to bind VC with challenge value having null | 00:00:01 |
| TC_Mimoto_WalletBinding_27 | Generating OTP to bind VC with formate value having null | 00:00:02 |
| TC_Mimoto_WalletBinding_10 | Generating OTP to bind VC with individualId being null | 00:00:01 |
| TC_Mimoto_WalletBinding_32 | Generating OTP to bind VC with authFactorType1 value having null | 00:00:02 |
| TC_Mimoto_WalletBinding_37 | Generating OTP to bind VC with format1 value having null | 00:00:02 |
| TC_Mimoto_WalletBinding_39 | Generating OTP to bind VC with null as publickey | 00:00:11 |
| TC_Mimoto_WalletBinding_01 | Generating OTP to bind VC with valid UIN | 00:00:02 |
| TC_Mimoto_WalletBinding_04 | Generating OTP to bind VC with past request time | 00:00:01 |
| TC_Mimoto_WalletBinding_16 | Generating OTP to bind VC with authfactortype value being just space | 00:00:02 |
| TC_Mimoto_WalletBinding_21 | Generating OTP to bind VC with challenge value having space | 00:00:01 |
| TC_Mimoto_WalletBinding_26 | Generating OTP to bind VC with formate value having space | 00:00:01 |
| TC_Mimoto_WalletBinding_12 | Generating OTP to bind VC with individualId value having space | 00:00:01 |
| TC_Mimoto_WalletBinding_31 | Generating OTP to bind VC with authFactorType1 value having space | 00:00:02 |
| TC_Mimoto_WalletBinding_36 | Generating OTP to bind VC with format1 value having space | 00:00:02 |
| TC_Mimoto_WalletBinding_52 | Generating OTP to bind VID VC with empty authfactortype | 00:00:01 |
| TC_Mimoto_WalletBinding_58 | Generating OTP to bind VID VC with empty challenge | 00:00:02 |
| TC_Mimoto_WalletBinding_63 | Generating OTP to bind VID VC with empty formate | 00:00:01 |
| TC_Mimoto_WalletBinding_47 | Generating OTP to bind vid VC with empty individualId | 00:00:02 |
| TC_Mimoto_WalletBinding_44 | Generating OTP to bind vid VC with empty request time | 00:00:01 |
| TC_Mimoto_WalletBinding_68 | Generating OTP to bind VID VC with empty authFactorType1 | 00:00:01 |
| TC_Mimoto_WalletBinding_73 | Generating OTP to bind VID VC with empty format1 | 00:00:01 |
| TC_Mimoto_WalletBinding_43 | Generating OTP to bind vid VC with future request time | 00:00:01 |
| TC_Mimoto_WalletBinding_51 | Generating OTP to bind VID VC with invalid authfactortype | 00:00:02 |
| TC_Mimoto_WalletBinding_56 | Generating OTP to bind VID VC with invalid challenge | 00:00:01 |
| TC_Mimoto_WalletBinding_61 | Generating OTP to bind VID VC with invalid formate | 00:00:01 |
| TC_Mimoto_WalletBinding_46 | Generating OTP to bind vid VC with invalid individualId | 00:00:01 |
| TC_Mimoto_WalletBinding_41 | Generating OTP to bind vid VC with invalid request time | 00:00:01 |
| TC_Mimoto_WalletBinding_66 | Generating OTP to bind VID VC with invalid authFactorType1 | 00:00:02 |
| TC_Mimoto_WalletBinding_71 | Generating OTP to bind VID VC with invalid format1 | 00:00:01 |
| TC_Mimoto_WalletBinding_76 | Generating OTP to bind VID VC with invalid publickey | 00:00:01 |
| TC_Mimoto_WalletBinding_53 | Generating OTP to bind VID VC with missing authfactortype | 00:00:01 |
| TC_Mimoto_WalletBinding_57 | Generating OTP to bind VID VC with missing challenge | 00:00:01 |
| TC_Mimoto_WalletBinding_62 | Generating OTP to bind VID VC with missing formate | 00:00:01 |
| TC_Mimoto_WalletBinding_49 | Generating OTP to bind vid VC with missing individualId | 00:00:02 |
| TC_Mimoto_WalletBinding_45 | Generating OTP to bind vid VC with missing request time | 00:00:01 |
| TC_Mimoto_WalletBinding_67 | Generating OTP to bind VID VC with missing authFactorType1 | 00:00:02 |
| TC_Mimoto_WalletBinding_72 | Generating OTP to bind VID VC with missing format1 | 00:00:01 |
| TC_Mimoto_WalletBinding_78 | Generating OTP to bind VID VC with missing publickey | 00:00:10 |
| TC_Mimoto_WalletBinding_55 | Generating OTP to bind VID VC with authfactortype value being just null | 00:00:01 |
| TC_Mimoto_WalletBinding_60 | Generating OTP to bind VID VC with challenge value having null | 00:00:01 |
| TC_Mimoto_WalletBinding_65 | Generating OTP to bind VID VC with formate value having null | 00:00:01 |
| TC_Mimoto_WalletBinding_48 | Generating OTP to bind vid VC with null individualId | 00:00:02 |
| TC_Mimoto_WalletBinding_70 | Generating OTP to bind VID VC with authFactorType1 value having null | 00:00:01 |
| TC_Mimoto_WalletBinding_75 | Generating OTP to bind VID VC with format1 value having null | 00:00:02 |
| TC_Mimoto_WalletBinding_77 | Generating OTP to bind VID VC with null as publickey | 00:00:12 |
| TC_Mimoto_WalletBinding_42 | Generating OTP to bind vid VC with past request time | 00:00:02 |
| TC_Mimoto_WalletBinding_54 | Generating OTP to bind VID VC with authfactortype value being just space | 00:00:01 |
| TC_Mimoto_WalletBinding_59 | Generating OTP to bind VID VC with challenge value having space | 00:00:01 |
| TC_Mimoto_WalletBinding_64 | Generating OTP to bind VID VC with formate value having space | 00:00:01 |
| TC_Mimoto_WalletBinding_50 | Generating OTP to bind VID VC with individualId value having space | 00:00:01 |
| TC_Mimoto_WalletBinding_69 | Generating OTP to bind VID VC with authFactorType1 value having space | 00:00:01 |
| TC_Mimoto_WalletBinding_74 | Generating OTP to bind VID VC with format1 value having space | 00:00:02 |
| GetAllIssuers — Passed | ||
| TC_Mimoto_GetAllIssuers_01 | Retrieving issuers with all valid parameters | 00:00:01 |
| TC_Mimoto_GetAllIssuers_03 | Retrieving invalid issuer | 00:00:01 |
| TC_Mimoto_GetAllIssuers_02 | Retrieving all specific issuer with all valid parameters | 00:00:01 |
| GetIssuerWellKnown — Passed | ||
| Mimoto_GetIssuerWellKnown_All_Valid_Smoke | Generating the issuer well known with all valid parameters | 00:00:01 |
| GoogleLoginToken — Passed | ||
| TC_Mimoto_GoogleLoginToken_05 | Creating the sesion token for google login with expired token and expects it to fail | 00:00:01 |
| TC_Mimoto_GoogleLoginToken_04 | Creating the sesion token for google login with expired token and expects it to fail | 00:00:01 |
| TC_Mimoto_GoogleLoginToken_03 | Creating the sesion token for google login with invalid IDT token and expects it to fail | 00:00:01 |
| TC_Mimoto_GoogleLoginToken_02 | Creating the sesion token for google login with invalid provider | 00:00:01 |
| TC_Mimoto_GoogleLoginToken_01 | Creating the sesion token for google login | 00:00:01 |
| GetUserProfile — Passed | ||
| TC_Mimoto_GetUserProfile_01 | Get the user profile details for the session login | 00:00:01 |
| CreateWallet — Passed | ||
| TC_Mimoto_CreateWallet_07 | Creating new wallet with empty wallet name and expects to fail | 00:00:01 |
| TC_Mimoto_CreateWallet_15 | Creating new wallet with empty wallet pin and expects to fail | 00:00:01 |
| TC_Mimoto_CreateWallet_06 | Creating new wallet with invalid wallet name and expects to fail | 00:00:01 |
| TC_Mimoto_CreateWallet_09 | Creating new wallet with missing wallet name | 00:00:01 |
| TC_Mimoto_CreateWallet_17 | Creating new wallet with missing wallet pin and expects to fail | 00:00:01 |
| TC_Mimoto_CreateWallet_10 | Creating new wallet with more than 50 characters in wallet name and expects to fail | 00:00:01 |
| TC_Mimoto_CreateWallet_14 | Creating new wallet with wallet pin with more than 6 digits and expects to fail | 00:00:01 |
| TC_Mimoto_CreateWallet_03 | Creating new wallet for the same user with same name with successful login | 00:00:01 |
| TC_Mimoto_CreateWallet_05 | Creating new wallet with expired session and expects to fail | 00:00:01 |
| TC_Mimoto_CreateWallet_08 | Creating new wallet with space in wallet name and expects to fail | 00:00:01 |
| TC_Mimoto_CreateWallet_16 | Creating new wallet with space in wallet pin and expects to fail | 00:00:01 |
| TC_Mimoto_CreateWallet_20 | Creating new wallet with special characters in wallet pin and expects to fail | 00:00:01 |
| TC_Mimoto_CreateWallet_19 | Creating new wallet with string value in wallet pin and expects to fail | 00:00:01 |
| TC_Mimoto_CreateWallet_13 | Creating new wallet with numbers as wallet name | 00:00:01 |
| TC_Mimoto_CreateWallet_12 | Creating new wallet with special characters as wallet name and expects to fail | 00:00:01 |
| TC_Mimoto_CreateWallet_11 | Creating new wallet with wallet name contains spaces | 00:00:01 |
| TC_Mimoto_CreateWallet_21 | Creating new wallet with wallet pin and confirm wallet pin mismatch and expects to fail | 00:00:01 |
| TC_Mimoto_CreateWallet_04 | Creating new wallet without login and expects to fail | 00:00:01 |
| TC_Mimoto_CreateWallet_02 | Creating new wallet for the same user with successful login | 00:00:01 |
| TC_Mimoto_CreateWallet_22 | Creating new wallet without wallet pin and wallet name and expects to fail | 00:00:01 |
| TC_Mimoto_CreateWallet_01 | Creating new wallet with successful login | 00:00:01 |
| TC_Mimoto_CreateWallet_18 | Creating new wallet with invalid wallet pin and expects to fail | 00:00:01 |
| UnlockWallet — Passed | ||
| TC_Mimoto_UnlockWallet_03 | Unlock the wallet with incorrect wallet Pin and expects it to fail | 00:00:01 |
| TC_Mimoto_UnlockWallet_02 | Unlock the wallet with invalid wallet id and expects it to fail | 00:00:01 |
| TC_Mimoto_UnlockWallet_06 | Unlock the wallet with invalid wallet Pin and expects it to fail | 00:00:01 |
| TC_Mimoto_UnlockWallet_04 | Unlock the wallet without login session and expects it to fail | 00:00:01 |
| TC_Mimoto_UnlockWallet_01 | Unlock the wallet that is created | 00:00:01 |
| OAuthDetailsRequestForGoogleLogin — Passed | ||
| TC_Mimoto_OAuthDetailsRequestForGoogleLogin_01 | Creating Oauth's details with all valid parameters | 00:00:01 |
| TC_Mimoto_OAuthDetailsRequestForGoogleLogin_02 | Creating Oauth's details with all valid parameters for Neg scenario | 00:00:01 |
| AuthenticateUserForGoogleLogin — Passed | ||
| TC_Mimoto_AuthenticateUserForGoogleLogin_02 | Authenticate user to download credentials with all valid parameters for neg scenario | 00:00:11 |
| TC_Mimoto_AuthenticateUserForGoogleLogin_01 | Authenticate user to download credentials with all valid parameters | 00:00:12 |
| AuthorizationCodeForGoogleLogin — Passed | ||
| TC_Mimoto_AuthorizationCodeForGoogleLogin_01 | Generate authorization code to download credential issuer | 00:00:01 |
| TC_Mimoto_AuthorizationCodeForGoogleLogin_02 | Generate authorization code to download credential issuer for Neg scenario | 00:00:01 |
| DownloadMosipIssuerCredentialWithGoogleLogin — known_issues | ||
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_05 | Downloading credential with null value in wallet id along with google login and expects to fail | 00:00:00 |
| DownloadMosipIssuerCredentialWithGoogleLogin — Passed | ||
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_01 | Downloading credential with all valid parameters along with google login | 00:00:03 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_02 | Downloading same credential with all valid parameters along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_23 | Downloading credential with empty code verifier along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_13 | Downloading credential with empty code along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_33 | Downloading credential with empty credential along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_08 | Downloading credential with empty grant type along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_28 | Downloading credential with empty issuer along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_18 | Downloading credential with empty redirect uri along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_37 | Downloading credential with empty request body with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_22 | Downloading credential with invalid code verifier along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_12 | Downloading credential with invalid code along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_32 | Downloading credential with invalid credential along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_07 | Downloading credential with invalid grant type along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_27 | Downloading credential with invalid issuer along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_17 | Downloading credential with invalid redirect uri along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_03 | Downloading credential with invalid wallet id along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_25 | Downloading credential with missing code verifier along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_15 | Downloading credential with missing code along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_35 | Downloading credential with missing credential along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_10 | Downloading credential with missing grant type along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_30 | Downloading credential with missing issuer along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_20 | Downloading credential with missing redirect uri along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_11 | Downloading credential with numeric grant type along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_26 | Downloading credential with numeric in code verifier along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_16 | Downloading credential with numeric in code along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_36 | Downloading credential with numeric in credential along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_31 | Downloading credential with numeric in issuer along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_21 | Downloading credential with numeric in redirect uri along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_06 | Downloading credential with numeric value in wallet id along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_24 | Downloading credential with space in code verifier along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_14 | Downloading credential with space in code along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_34 | Downloading credential with space in credential along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_09 | Downloading credential with space in grant type along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_29 | Downloading credential with space in issuer along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_19 | Downloading credential with space in redirect uri along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_04 | Downloading credential with sapce value in wallet id along with google login and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_40 | Downloading credential with expired google login session and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_38 | Downloading credential with all valid parameters along with google login when a different session is active and expects to fail | 00:00:01 |
| TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_39 | Downloading credential without google login and expects to fail | 00:00:01 |
| OAuthDetailsRequestSunBirdCForGoogleLogin — Passed | ||
| TC_Mimoto_OAuthDetailsRequestSunBirdCForGoogleLogin_02 | Getting auth details for downloading multiple sunbird credentials with google login | 00:00:01 |
| TC_Mimoto_OAuthDetailsRequestSunBirdCForGoogleLogin_01 | Getting auth details for downloading sunbird credentials with google login | 00:00:01 |
| AuthenticateUserSunBirdCForGoogleLogin — Passed | ||
| TC_Mimoto_AuthenticateUserSunBirdCForGoogleLogin_02 | Authenticating user for downloading stayprotected credential with google login | 00:00:01 |
| TC_Mimoto_AuthenticateUserSunBirdCForGoogleLogin_01 | Authenticating user for downloading stayprotected credential with google login | 00:00:01 |
| AuthorizationCodeSunBirdCForGoogleLogin — Passed | ||
| TC_Mimoto_AuthorizationCodeSunBirdC_02 | Generating authorization code for downloading multiple sunbird VC with google login | 00:00:01 |
| TC_Mimoto_AuthorizationCodeSunBirdC_01 | Generating authorization code for downloading sunbird VC with google login | 00:00:01 |
| DownloadIssuerCredentialWithGoogleLogin — Passed | ||
| TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_02 | Downloading Multiple sunbird credential for policy already downloaded with valid authorizationCode after google login | 00:00:01 |
| TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_01 | Downloading sunbird credential with valid authorizationCode after google login | 00:00:02 |
| TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_03 | Downloading sunbird credential with valid authorizationCode after google login with invalid locale and expects it to fail | 00:00:01 |
| TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_05 | Downloading sunbird credential with valid authorizationCode after google login with numeric in locale and expects it to fail | 00:00:01 |
| TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_04 | Downloading sunbird credential with valid authorizationCode after google login with space in locale and expects it to fail | 00:00:01 |
| FetchAllCredentials — known_issues | ||
| TC_Mimoto_FetchAllCredentials_03 | Get list of all credentials with empty wallet id and expects it to fail | 00:00:00 |
| FetchAllCredentials — Passed | ||
| TC_Mimoto_FetchAllCredentials_07 | Get list of all credentials with expired session and expects it to fail | 00:00:01 |
| TC_Mimoto_FetchAllCredentials_05 | Get list of all credentials with invalid session and expects it to fail | 00:00:01 |
| TC_Mimoto_FetchAllCredentials_02 | Get list of all credentials with invalid wallet id and expects it to fail | 00:00:01 |
| TC_Mimoto_FetchAllCredentials_04 | Get list of all credentials with space wallet id and expects it to fail | 00:00:01 |
| TC_Mimoto_FetchAllCredentials_06 | Get list of all credentials without unlocking wallet and expects it to fail | 00:00:01 |
| TC_Mimoto_FetchAllCredentials_01 | Get list of all credentials saved for the wallet | 00:00:01 |
| ViewCredential — Passed | ||
| TC_Mimoto_ViewCredential_03 | Download the credential saved for the wallet with credential ID | 00:00:01 |
| TC_Mimoto_ViewCredential_04 | View the credential saved for the wallet with credential ID when action query is empty | 00:00:01 |
| TC_Mimoto_ViewCredential_08 | View the credential saved for the wallet with empty credential ID and expects it to fail | 00:00:01 |
| TC_Mimoto_ViewCredential_11 | View the credential saved for the wallet with empty wallet ID and expects it to fail | 00:00:01 |
| TC_Mimoto_ViewCredential_06 | View the credential saved for the wallet with credential ID when action query as invalid | 00:00:01 |
| TC_Mimoto_ViewCredential_14 | View the credential saved for the wallet with invalid accept header and expects it to fail | 00:00:01 |
| TC_Mimoto_ViewCredential_13 | View the credential saved for the wallet with invalid accept language and expects it to fail | 00:00:01 |
| TC_Mimoto_ViewCredential_07 | View the credential saved for the wallet with invalid credential ID and expects it to fail | 00:00:01 |
| TC_Mimoto_ViewCredential_10 | View the credential saved for the wallet with invalid wallet ID and expects it to fail | 00:00:01 |
| TC_Mimoto_ViewCredential_02 | View the another credential saved for the wallet with credential ID | 00:00:01 |
| TC_Mimoto_ViewCredential_16 | View the credential saved for the wallet space in accept header and expects it to fail | 00:00:01 |
| TC_Mimoto_ViewCredential_14 | View the credential saved for the wallet with space in accept language and expects it to fail | 00:00:01 |
| TC_Mimoto_ViewCredential_09 | View the credential saved for the wallet with space in credential ID and expects it to fail | 00:00:01 |
| TC_Mimoto_ViewCredential_12 | View the credential saved for the wallet with space in wallet ID and expects it to fail | 00:00:01 |
| TC_Mimoto_ViewCredential_05 | View the credential saved for the wallet with credential ID when action query has only space | 00:00:01 |
| TC_Mimoto_ViewCredential_17 | View the credential saved for the wallet with expired token and expects it to fail | 00:00:01 |
| TC_Mimoto_ViewCredential_15 | View the credential saved for the wallet without accept header and expects it to fail | 00:00:01 |
| TC_Mimoto_ViewCredential_01 | View the credential saved for the wallet with credential ID | 00:00:01 |
| DeleteCredentials — Passed | ||
| TC_Mimoto_DeleteCredentials_05 | Delete the credential empty or space in credential id and expects it to fail | 00:00:01 |
| TC_Mimoto_DeleteCredentials_03 | Delete the credential invalid credential id for the wallet and expects it to fail | 00:00:01 |
| TC_Mimoto_DeleteCredentials_04 | Delete the credential invalid wallet id for the wallet and expects it to fail | 00:00:01 |
| TC_Mimoto_DeleteCredentials_06 | Delete the credential for the wallet with multiple credentials created | 00:00:01 |
| TC_Mimoto_DeleteCredentials_08 | Delete the credential for the wallet without login and expects it to fail | 00:00:01 |
| TC_Mimoto_DeleteCredentials_02 | Delete the credential that is already deleted for the wallet and expects it to fail | 00:00:01 |
| TC_Mimoto_DeleteCredentials_01 | Delete the credential that is saved for the wallet | 00:00:01 |
| GetWallets — Passed | ||
| TC_Mimoto_GetWallets_03 | Get list of all the wallets that is present in DB with expired login and expects to fail | 00:00:01 |
| TC_Mimoto_GetWallets_02 | Get list of all the wallets that is present in DB without login and expects to fail | 00:00:01 |
| TC_Mimoto_GetWallets_01 | Get list of all the wallets that is present in DB | 00:00:08 |
| UnlockWalletForTemporarilyLock — Passed | ||
| TC_Mimoto_UnlockWalletForTemporarilyLock_01 | Unlock the wallet with incorrect wallet Pin till wallet gets temporarily locks | 00:00:01 |
| DeleteWallet — Passed | ||
| TC_Mimoto_DeleteWallet_02 | Delete the wallet that is already deleted and expects it to fail | 00:00:01 |
| TC_Mimoto_DeleteWallet_04 | Delete the wallet with empty wallet id and expects it to fail | 00:00:01 |
| TC_Mimoto_DeleteWallet_07 | Delete the wallet with expired login session and expects it to fail | 00:00:01 |
| TC_Mimoto_DeleteWallet_03 | Delete the wallet with invalid wallet id and expects it to fail | 00:00:01 |
| TC_Mimoto_DeleteWallet_05 | Delete the wallet with space wallet id and expects it to fail | 00:00:01 |
| TC_Mimoto_DeleteWallet_06 | Delete the wallet without login session and expects it to fail | 00:00:01 |
| TC_Mimoto_DeleteWallet_01 | Delete the wallet that is created | 00:00:01 |
| UnlockWalletAfterDelete — Passed | ||
| TC_Mimoto_UnlockWalletAfterDelete_01 | Unlock the wallet that is already deleted and expects it to fail | 00:00:01 |
| Logout — Passed | ||
| TC_Mimoto_Logout_03 | Logout the session with expired login session and expects it to fail | 00:00:01 |
| TC_Mimoto_Logout_02 | Logout the session without creating the login session and providing random cookie value and expects it to fail | 00:00:01 |
| TC_Mimoto_Logout_01 | Logout the session that is created | 00:00:01 |
| GetUserProfileAfterLogout — Passed | ||
| TC_Mimoto_GetUserProfileAfterLogout_01 | Get the user profile details for the session login | 00:00:01 |
| ViewCredentialAfterLogout — Passed | ||
| TC_Mimoto_ViewCredential_18 | View the credential saved for the wallet after logout and expects it to fail | 00:00:01 |
| DeletePolicySunBirdR — Passed | ||
| TC_Mimoto_DeletePolicySunBirdR_01 | Deleting Sunbird policy with valid parameters | 00:00:01 |
| GetVerifierList — Passed | ||
| TC_Mimoto_GetVerifierList_01 | Retrieving verifiers list with all valid parameters | 00:00:01 |
| GetIssuerConfiguration — Passed | ||
| TC_Mimoto_GetIssuerConfiguration_01 | Retrieving verifiers list with all valid parameters | 00:00:01 |
| TC_Mimoto_GetIssuerConfiguration_02 | Retrieving verifiers list with invalid URL | 00:00:01 |
| Testcase Input |
|---|
| testCaseName=Mimoto_AddIdentity_Binding_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "Mimoto_AddIdentity_Binding_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","documents":[{"category":"{{category}}","value":"{{value}}"}],"identity":{"gender":[{"language":"eng","value":"MLE"},{"language":"ara","value":"MLE"},{"language":"fra","value":"MLE"},{"language":"kan","value":"MLE"},{"language":"hin","value":"MLE"},{"language":"tam","value":"MLE"}],"city":[{"language":"eng","value":"TEST_CITYeng"},{"language":"ara","value":"TEST_CITYara"},{"language":"fra","value":"TEST_CITYfra"},{"language":"kan","value":"TEST_CITYkan"},{"language":"hin","value":"TEST_CITYhin"},{"language":"tam","value":"TEST_CITYtam"}],"postalCode":"{{postalCode}}","fullName":[{"language":"eng","value":"TEST_FULLNAMEeng"},{"language":"ara","value":"TEST_FULLNAMEara"},{"language":"fra","value":"TEST_FULLNAMEfra"},{"language":"kan","value":"TEST_FULLNAMEkan"},{"language":"hin","value":"TEST_FULLNAMEhin"},{"language":"tam","value":"TEST_FULLNAMEtam"}],"dateOfBirth":"{{dateOfBirth}}","proofOfIdentity":{"format":"txt","type":"DOC001","value":"fileReferenceID"},"individualBiometrics":{"format":"cbeff","version":1,"value":"fileReferenceID"},"IDSchemaVersion":0.4,"province":[{"language":"eng","value":"TEST_PROVINCEeng"},{"language":"ara","value":"TEST_PROVINCEara"},{"language":"fra","value":"TEST_PROVINCEfra"},{"language":"kan","value":"TEST_PROVINCEkan"},{"language":"hin","value":"TEST_PROVINCEhin"},{"language":"tam","value":"TEST_PROVINCEtam"}],"zone":[{"language":"eng","value":"TEST_ZONEeng"},{"language":"ara","value":"TEST_ZONEara"},{"language":"fra","value":"TEST_ZONEfra"},{"language":"kan","value":"TEST_ZONEkan"},{"language":"hin","value":"TEST_ZONEhin"},{"language":"tam","value":"TEST_ZONEtam"}],"phone":"$PHONENUMBERFORIDENTITY$","addressLine1":[{"language":"eng","value":"TEST_ADDRESSLINE1eng"},{"language":"ara","value":"TEST_ADDRESSLINE1ara"},{"language":"fra","value":"TEST_ADDRESSLINE1fra"},{"language":"kan","value":"TEST_ADDRESSLINE1kan"},{"language":"hin","value":"TEST_ADDRESSLINE1hin"},{"language":"tam","value":"TEST_ADDRESSLINE1tam"}],"addressLine2":[{"language":"eng","value":"TEST_ADDRESSLINE2eng"},{"language":"ara","value":"TEST_ADDRESSLINE2ara"},{"language":"fra","value":"TEST_ADDRESSLINE2fra"},{"language":"kan","value":"TEST_ADDRESSLINE2kan"},{"language":"hin","value":"TEST_ADDRESSLINE2hin"},{"language":"tam","value":"TEST_ADDRESSLINE2tam"}],"UIN":"{{UIN}}","addressLine3":[{"language":"eng","value":"TEST_ADDRESSLINE3eng"},{"language":"ara","value":"TEST_ADDRESSLINE3ara"},{"language":"fra","value":"TEST_ADDRESSLINE3fra"},{"language":"kan","value":"TEST_ADDRESSLINE3kan"},{"language":"hin","value":"TEST_ADDRESSLINE3hin"},{"language":"tam","value":"TEST_ADDRESSLINE3tam"}],"region":[{"language":"eng","value":"TEST_REGIONeng"},{"language":"ara","value":"TEST_REGIONara"},{"language":"fra","value":"TEST_REGIONfra"},{"language":"kan","value":"TEST_REGIONkan"},{"language":"hin","value":"TEST_REGIONhin"},{"language":"tam","value":"TEST_REGIONtam"}],"email":"$EMAILVALUE$"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=mimoto/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a new identity with all valid parameters for Binding APIs, uniqueIdentifier=TC_Mimoto_AddIdentity_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_AddIdentity_downloadIssuerCredentialWithGoogleLogin_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "Mimoto_AddIdentity_downloadIssuerCredentialWithGoogleLogin_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","documents":[{"category":"{{category}}","value":"{{value}}"}],"identity":{"gender":[{"language":"eng","value":"MLE"},{"language":"ara","value":"MLE"},{"language":"fra","value":"MLE"},{"language":"kan","value":"MLE"},{"language":"hin","value":"MLE"},{"language":"tam","value":"MLE"}],"city":[{"language":"eng","value":"TEST_CITYeng"},{"language":"ara","value":"TEST_CITYara"},{"language":"fra","value":"TEST_CITYfra"},{"language":"kan","value":"TEST_CITYkan"},{"language":"hin","value":"TEST_CITYhin"},{"language":"tam","value":"TEST_CITYtam"}],"postalCode":"{{postalCode}}","fullName":[{"language":"eng","value":"TEST_FULLNAMEeng"},{"language":"ara","value":"TEST_FULLNAMEara"},{"language":"fra","value":"TEST_FULLNAMEfra"},{"language":"kan","value":"TEST_FULLNAMEkan"},{"language":"hin","value":"TEST_FULLNAMEhin"},{"language":"tam","value":"TEST_FULLNAMEtam"}],"dateOfBirth":"{{dateOfBirth}}","proofOfIdentity":{"format":"txt","type":"DOC001","value":"fileReferenceID"},"individualBiometrics":{"format":"cbeff","version":1,"value":"fileReferenceID"},"IDSchemaVersion":0.4,"province":[{"language":"eng","value":"TEST_PROVINCEeng"},{"language":"ara","value":"TEST_PROVINCEara"},{"language":"fra","value":"TEST_PROVINCEfra"},{"language":"kan","value":"TEST_PROVINCEkan"},{"language":"hin","value":"TEST_PROVINCEhin"},{"language":"tam","value":"TEST_PROVINCEtam"}],"zone":[{"language":"eng","value":"TEST_ZONEeng"},{"language":"ara","value":"TEST_ZONEara"},{"language":"fra","value":"TEST_ZONEfra"},{"language":"kan","value":"TEST_ZONEkan"},{"language":"hin","value":"TEST_ZONEhin"},{"language":"tam","value":"TEST_ZONEtam"}],"phone":"$PHONENUMBERFORIDENTITY$","addressLine1":[{"language":"eng","value":"TEST_ADDRESSLINE1eng"},{"language":"ara","value":"TEST_ADDRESSLINE1ara"},{"language":"fra","value":"TEST_ADDRESSLINE1fra"},{"language":"kan","value":"TEST_ADDRESSLINE1kan"},{"language":"hin","value":"TEST_ADDRESSLINE1hin"},{"language":"tam","value":"TEST_ADDRESSLINE1tam"}],"addressLine2":[{"language":"eng","value":"TEST_ADDRESSLINE2eng"},{"language":"ara","value":"TEST_ADDRESSLINE2ara"},{"language":"fra","value":"TEST_ADDRESSLINE2fra"},{"language":"kan","value":"TEST_ADDRESSLINE2kan"},{"language":"hin","value":"TEST_ADDRESSLINE2hin"},{"language":"tam","value":"TEST_ADDRESSLINE2tam"}],"UIN":"{{UIN}}","addressLine3":[{"language":"eng","value":"TEST_ADDRESSLINE3eng"},{"language":"ara","value":"TEST_ADDRESSLINE3ara"},{"language":"fra","value":"TEST_ADDRESSLINE3fra"},{"language":"kan","value":"TEST_ADDRESSLINE3kan"},{"language":"hin","value":"TEST_ADDRESSLINE3hin"},{"language":"tam","value":"TEST_ADDRESSLINE3tam"}],"region":[{"language":"eng","value":"TEST_REGIONeng"},{"language":"ara","value":"TEST_REGIONara"},{"language":"fra","value":"TEST_REGIONfra"},{"language":"kan","value":"TEST_REGIONkan"},{"language":"hin","value":"TEST_REGIONhin"},{"language":"tam","value":"TEST_REGIONtam"}],"email":"$EMAILVALUE$"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=mimoto/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a new identity for downloading issuer credential, uniqueIdentifier=TC_Mimoto_AddIdentity_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_AddIdentity_downloadIssuerCredential_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "Mimoto_AddIdentity_downloadIssuerCredential_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","documents":[{"category":"{{category}}","value":"{{value}}"}],"identity":{"gender":[{"language":"eng","value":"MLE"},{"language":"ara","value":"MLE"},{"language":"fra","value":"MLE"},{"language":"kan","value":"MLE"},{"language":"hin","value":"MLE"},{"language":"tam","value":"MLE"}],"city":[{"language":"eng","value":"TEST_CITYeng"},{"language":"ara","value":"TEST_CITYara"},{"language":"fra","value":"TEST_CITYfra"},{"language":"kan","value":"TEST_CITYkan"},{"language":"hin","value":"TEST_CITYhin"},{"language":"tam","value":"TEST_CITYtam"}],"postalCode":"{{postalCode}}","fullName":[{"language":"eng","value":"TEST_FULLNAMEeng"},{"language":"ara","value":"TEST_FULLNAMEara"},{"language":"fra","value":"TEST_FULLNAMEfra"},{"language":"kan","value":"TEST_FULLNAMEkan"},{"language":"hin","value":"TEST_FULLNAMEhin"},{"language":"tam","value":"TEST_FULLNAMEtam"}],"dateOfBirth":"{{dateOfBirth}}","proofOfIdentity":{"format":"txt","type":"DOC001","value":"fileReferenceID"},"individualBiometrics":{"format":"cbeff","version":1,"value":"fileReferenceID"},"IDSchemaVersion":0.4,"province":[{"language":"eng","value":"TEST_PROVINCEeng"},{"language":"ara","value":"TEST_PROVINCEara"},{"language":"fra","value":"TEST_PROVINCEfra"},{"language":"kan","value":"TEST_PROVINCEkan"},{"language":"hin","value":"TEST_PROVINCEhin"},{"language":"tam","value":"TEST_PROVINCEtam"}],"zone":[{"language":"eng","value":"TEST_ZONEeng"},{"language":"ara","value":"TEST_ZONEara"},{"language":"fra","value":"TEST_ZONEfra"},{"language":"kan","value":"TEST_ZONEkan"},{"language":"hin","value":"TEST_ZONEhin"},{"language":"tam","value":"TEST_ZONEtam"}],"phone":"$PHONENUMBERFORIDENTITY$","addressLine1":[{"language":"eng","value":"TEST_ADDRESSLINE1eng"},{"language":"ara","value":"TEST_ADDRESSLINE1ara"},{"language":"fra","value":"TEST_ADDRESSLINE1fra"},{"language":"kan","value":"TEST_ADDRESSLINE1kan"},{"language":"hin","value":"TEST_ADDRESSLINE1hin"},{"language":"tam","value":"TEST_ADDRESSLINE1tam"}],"addressLine2":[{"language":"eng","value":"TEST_ADDRESSLINE2eng"},{"language":"ara","value":"TEST_ADDRESSLINE2ara"},{"language":"fra","value":"TEST_ADDRESSLINE2fra"},{"language":"kan","value":"TEST_ADDRESSLINE2kan"},{"language":"hin","value":"TEST_ADDRESSLINE2hin"},{"language":"tam","value":"TEST_ADDRESSLINE2tam"}],"UIN":"{{UIN}}","addressLine3":[{"language":"eng","value":"TEST_ADDRESSLINE3eng"},{"language":"ara","value":"TEST_ADDRESSLINE3ara"},{"language":"fra","value":"TEST_ADDRESSLINE3fra"},{"language":"kan","value":"TEST_ADDRESSLINE3kan"},{"language":"hin","value":"TEST_ADDRESSLINE3hin"},{"language":"tam","value":"TEST_ADDRESSLINE3tam"}],"region":[{"language":"eng","value":"TEST_REGIONeng"},{"language":"ara","value":"TEST_REGIONara"},{"language":"fra","value":"TEST_REGIONfra"},{"language":"kan","value":"TEST_REGIONkan"},{"language":"hin","value":"TEST_REGIONhin"},{"language":"tam","value":"TEST_REGIONtam"}],"email":"$EMAILVALUE$"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=mimoto/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a new identity for downloading issuer credential, uniqueIdentifier=TC_Mimoto_AddIdentity_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_AddIdentity_withValidParameters_smoke_Pos, endPoint=/idrepository/v1/identity/, role=idrepo, templateFields=null, input={ "value": "$BIOVALUE$", "id": "mosip.id.create", "registrationId": "$RID$", "biometricReferenceId": "23452353", "UIN": "$UIN$", "dateOfBirth": "1992/04/15", "postalCode": "14022", "email": "Mimoto_AddIdentity_withValidParameters_smoke_Pos@mosip.net", "phone": "9876543210", "referenceIdentityNumber": "6789545678878", "version": "v1", "introducerRID": "212124324784879", "introducerUIN": "212124324784879", "category": "individualBiometrics", "requesttime": "$TIMESTAMP$" }, output={ "status":"ACTIVATED" }, inputTemplate={"request":{"registrationId":"{{registrationId}}","documents":[{"category":"{{category}}","value":"{{value}}"}],"identity":{"gender":[{"language":"eng","value":"MLE"},{"language":"ara","value":"MLE"},{"language":"fra","value":"MLE"},{"language":"kan","value":"MLE"},{"language":"hin","value":"MLE"},{"language":"tam","value":"MLE"}],"city":[{"language":"eng","value":"TEST_CITYeng"},{"language":"ara","value":"TEST_CITYara"},{"language":"fra","value":"TEST_CITYfra"},{"language":"kan","value":"TEST_CITYkan"},{"language":"hin","value":"TEST_CITYhin"},{"language":"tam","value":"TEST_CITYtam"}],"postalCode":"{{postalCode}}","fullName":[{"language":"eng","value":"TEST_FULLNAMEeng"},{"language":"ara","value":"TEST_FULLNAMEara"},{"language":"fra","value":"TEST_FULLNAMEfra"},{"language":"kan","value":"TEST_FULLNAMEkan"},{"language":"hin","value":"TEST_FULLNAMEhin"},{"language":"tam","value":"TEST_FULLNAMEtam"}],"dateOfBirth":"{{dateOfBirth}}","proofOfIdentity":{"format":"txt","type":"DOC001","value":"fileReferenceID"},"individualBiometrics":{"format":"cbeff","version":1,"value":"fileReferenceID"},"IDSchemaVersion":0.4,"province":[{"language":"eng","value":"TEST_PROVINCEeng"},{"language":"ara","value":"TEST_PROVINCEara"},{"language":"fra","value":"TEST_PROVINCEfra"},{"language":"kan","value":"TEST_PROVINCEkan"},{"language":"hin","value":"TEST_PROVINCEhin"},{"language":"tam","value":"TEST_PROVINCEtam"}],"zone":[{"language":"eng","value":"TEST_ZONEeng"},{"language":"ara","value":"TEST_ZONEara"},{"language":"fra","value":"TEST_ZONEfra"},{"language":"kan","value":"TEST_ZONEkan"},{"language":"hin","value":"TEST_ZONEhin"},{"language":"tam","value":"TEST_ZONEtam"}],"phone":"$PHONENUMBERFORIDENTITY$","addressLine1":[{"language":"eng","value":"TEST_ADDRESSLINE1eng"},{"language":"ara","value":"TEST_ADDRESSLINE1ara"},{"language":"fra","value":"TEST_ADDRESSLINE1fra"},{"language":"kan","value":"TEST_ADDRESSLINE1kan"},{"language":"hin","value":"TEST_ADDRESSLINE1hin"},{"language":"tam","value":"TEST_ADDRESSLINE1tam"}],"addressLine2":[{"language":"eng","value":"TEST_ADDRESSLINE2eng"},{"language":"ara","value":"TEST_ADDRESSLINE2ara"},{"language":"fra","value":"TEST_ADDRESSLINE2fra"},{"language":"kan","value":"TEST_ADDRESSLINE2kan"},{"language":"hin","value":"TEST_ADDRESSLINE2hin"},{"language":"tam","value":"TEST_ADDRESSLINE2tam"}],"UIN":"{{UIN}}","addressLine3":[{"language":"eng","value":"TEST_ADDRESSLINE3eng"},{"language":"ara","value":"TEST_ADDRESSLINE3ara"},{"language":"fra","value":"TEST_ADDRESSLINE3fra"},{"language":"kan","value":"TEST_ADDRESSLINE3kan"},{"language":"hin","value":"TEST_ADDRESSLINE3hin"},{"language":"tam","value":"TEST_ADDRESSLINE3tam"}],"region":[{"language":"eng","value":"TEST_REGIONeng"},{"language":"ara","value":"TEST_REGIONara"},{"language":"fra","value":"TEST_REGIONfra"},{"language":"kan","value":"TEST_REGIONkan"},{"language":"hin","value":"TEST_REGIONhin"},{"language":"tam","value":"TEST_REGIONtam"}],"email":"$EMAILVALUE$"}},"requesttime":"{{requesttime}}","id":"{{id}}","version":"{{version}}"}, outputTemplate=mimoto/AddIdentity/addIdentityResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a new identity with all valid parameters, uniqueIdentifier=TC_Mimoto_AddIdentity_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_Generate_Perpetual_VID_Binding_Valid_Smoke_sid, endPoint=/v1/mimoto/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "individualIdType": "UIN", "vidType": "Perpetual", "otp": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/GenerateVID/createGenerateVID, outputTemplate=mimoto/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating perpetual VID with binding valid request, uniqueIdentifier=TC_Mimoto_GenerateVID_06 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_Generate_Perpetual_VID_InValid_Otp_sid, endPoint=/v1/mimoto/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "vidType": "Perpetual", "otp": "112637338", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/GenerateVID/createGenerateVID, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating Perpetual VID with invalid OTP, uniqueIdentifier=TC_Mimoto_GenerateVID_02 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_Generate_Perpetual_VID_Invalid_TransactionId_Neg, endPoint=/v1/mimoto/vid, role=resident, templateFields=null, input={ "transactionID": "$trc45", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "vidType": "Perpetual", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/GenerateVID/createGenerateVID, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating perpetual VID with invalid transactionID, uniqueIdentifier=TC_Mimoto_GenerateVID_05 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_Generate_Perpetual_VID_Valid_Smoke_sid, endPoint=/v1/mimoto/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "vidType": "Perpetual", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/GenerateVID/createGenerateVID, outputTemplate=mimoto/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating Perpetual VID with all valid parameters, uniqueIdentifier=TC_Mimoto_GenerateVID_01 |
| Messages |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_Generate_Perpetual_VID_with_InvalidUIN_Valid_Otp_sid, endPoint=/v1/mimoto/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "253SDGSH@Y37", "individualIdType": "UIN", "vidType": "Perpetual", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/GenerateVID/createGenerateVID, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating Perpetual VID with invalid UIN, uniqueIdentifier=TC_Mimoto_GenerateVID_03 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=mimoto_Generate_Temporary_VID_Valid_Smoke_sid, endPoint=/v1/mimoto/vid, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "vidType": "Temporary", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/GenerateVID/createGenerateVID, outputTemplate=mimoto/GenerateVID/createGenerateVIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating temporary VID with all valid request, uniqueIdentifier=TC_Mimoto_GenerateVID_04 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_Generate_Perpetual_VID_Binding_Valid_Smoke_sid, endPoint=/idrepository/v1/vid, role=idrepo, templateFields=null, input={ "vidType": "Perpetual", "UIN": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "version": "v1", "id": "mosip.vid.create", "requesttime": "$TIMESTAMP$" }, output={ "vidStatus":"ACTIVE" }, inputTemplate=mimoto/CreateVID/createVid, outputTemplate=mimoto/CreateVID/createVidResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create perpetual VID for binding with valid details, uniqueIdentifier=TC_Mimoto_GenerateVID_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_Generate_Perpetual_VID_Valid_Smoke_sid, endPoint=/idrepository/v1/vid, role=idrepo, templateFields=null, input={ "vidType": "Perpetual", "UIN": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "version": "v1", "id": "mosip.vid.create", "requesttime": "$TIMESTAMP$" }, output={ "vidStatus":"ACTIVE" }, inputTemplate=mimoto/CreateVID/createVid, outputTemplate=mimoto/CreateVID/createVidResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create perpetual VID with valid details, uniqueIdentifier=TC_Mimoto_GenerateVID_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_Generate_Temporary_VID_Valid_Smoke_sid, endPoint=/idrepository/v1/vid, role=idrepo, templateFields=null, input={ "vidType": "Perpetual", "UIN": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "version": "v1", "id": "mosip.vid.create", "requesttime": "$TIMESTAMP$" }, output={ "vidStatus":"ACTIVE" }, inputTemplate=mimoto/CreateVID/createVid, outputTemplate=mimoto/CreateVID/createVidResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create temporary VID with valid details, uniqueIdentifier=TC_Mimoto_GenerateVID_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid, endPoint=/api/v1/Insurance, role=resident, templateFields=null, input={ "policyNumber": "$POLICYNUMBERFORSUNBIRDRC$", "policyName": "Start Insurance Gold Premium", "policyExpiresOn": "2033-04-20T20:48:17.684Z", "policyIssuedOn": "$TIMESTAMP$", "fullName" : "$FULLNAMEFORSUNBIRDRC$", "dob" : "$DOBFORSUNBIRDRC$", "benefits": [{"benefits": "Critical Surgery"}, {"benefits": "Full body checkup"}], "gender": "Male", "mobile": "0123456789", "email": "abhishek@gmail.com" }, output={ "status": "SUCCESSFUL" }, inputTemplate=mimoto/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdR, outputTemplate=mimoto/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdRResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new sunbird policy with valid parameters, uniqueIdentifier=TC_Mimoto_CreatePolicySunBirdR_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_SunBirdR_GetPolicy_NOAUTH_Valid_Smoke, endPoint=/api/v1/Insurance/{insuranceid}, role=resident, templateFields=null, input={ "insuranceid": "$ID:ESignet_SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid_osid$" }, output={ "policyNumber": "$POLICYNUMBERFORSUNBIRDRC$" }, inputTemplate=mimoto/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdR, outputTemplate=mimoto/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdRResult, restMethod=get, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Getting sunbird policy with valid parameters, uniqueIdentifier=TC_Mimoto_GetPolicySunBirdR_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_SunBirdR_SearchPolicy_NOAUTH_Valid_Smoke, endPoint=/api/v1/Insurance/search, role=resident, templateFields=null, input={ "offset": "0", "limit": "5", "fullName": "$FULLNAMEFORSUNBIRDRC$", "dob": "$DOBFORSUNBIRDRC$", "policyNumber": "$POLICYNUMBERFORSUNBIRDRC$" }, output={ }, inputTemplate=mimoto/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdR, outputTemplate=mimoto/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdRResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Searching sunbird policy with valid parameters, uniqueIdentifier=TC_Mimoto_SearchPolicySunBirdR_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$GETCLIENTIDFORMOSIPIDFROMMIMOTOACTUATOR$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$INJIREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=mimoto/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=mimoto/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating Oauth's details with all valid parameters, uniqueIdentifier=TC_Mimoto_OAuthDetailsRequest_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_AuthenticateUserIDP_uin_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "mimoto/SendOtpEsignet/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult" } }, inputTemplate=mimoto/AuthenticateUser/AuthenticateUser, outputTemplate=mimoto/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user to download credentials with all valid parameters, uniqueIdentifier=TC_Mimoto_AuthenticateUser_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_all_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=mimoto/AuthorizationCode/AuthorizationCode, outputTemplate=mimoto/AuthorizationCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate authorization code to download credential issuer, uniqueIdentifier=TC_Mimoto_AuthorizationCode_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$GETCLIENTIDFORINSURANCEFROMMIMOTOACTUATOR$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$INJIREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=mimoto/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=mimoto/SunBirdC/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Getting auth details for downloading sunbird credentials, uniqueIdentifier=TC_Mimoto_OAuthDetailsRequestSunBirdC_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_AuthenticateUser_SunBirdC_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "$SUNBIRDINSURANCEAUTHFACTORTYPE$", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=mimoto/SunBirdC/AuthenticateUserSunBirdC/AuthenticateUserSunBirdC, outputTemplate=mimoto/SunBirdC/AuthenticateUserSunBirdC/AuthenticateUserSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticating user for downloading sunbird credential, uniqueIdentifier=TC_Mimoto_AuthenticateUserSunBirdC_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_AuthorizationCode_SunBirdC_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "sunbird_rc_insurance_vc_ldp"}] }, output={ }, inputTemplate=mimoto/SunBirdC/AuthorizationCodeSunBirdC/AuthorizationCodeSunBirdC, outputTemplate=mimoto/SunBirdC/AuthorizationCodeSunBirdC/AuthorizationCodeSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating authorization code for downloading sunbird VC, uniqueIdentifier=TC_Mimoto_AuthorizationCodeSunBirdC_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredential_Invalid_AuthorizationCode_Neg, endPoint=/v1/mimoto/credentials/download, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "XjIsJgQAX3lrhMmXgRn-jerNMCqf0GdiBLx5MbMig", "redirect_uri": "$INJIREDIRECTURI$", "code_verifier": "$CODEVERIFIER$", "issuer": "Mosip", "credential": "MOSIPVerifiableCredential" }, output={ "errors":[ { "errorCode":"RESIDENT-APP-035" } ] }, inputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid credential AuthorizationCode, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredential_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredential_Invalid_Credential_Neg, endPoint=/v1/mimoto/credentials/download, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "redirect_uri": "$INJIREDIRECTURI$", "code_verifier": "$CODEVERIFIER$", "issuer": "Mosip", "credential": "MOSIPVerifiableCredentialInvalid" }, output={ "errors":[ { "errorCode":"RESIDENT-APP-035" } ] }, inputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid credential, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredential_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredential_Invalid_Issuer_Neg, endPoint=/v1/mimoto/credentials/download, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "redirect_uri": "$INJIREDIRECTURI$", "code_verifier": "$CODEVERIFIER$", "issuer": "MosipInvalid", "credential": "MOSIPVerifiableCredential" }, output={ "errors":[ { "errorCode":"RESIDENT-APP-035" } ] }, inputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid issuer, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredential_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredential_IssuerMosip_All_Valid_Smoke, endPoint=/v1/mimoto/credentials/download, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "redirect_uri": "$INJIREDIRECTURI$", "code_verifier": "$CODEVERIFIER$", "issuer": "Mosip", "credential": "MOSIPVerifiableCredential" }, output={ }, inputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with all valid parameters, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredential_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredential_IssuerSunBird_All_Valid_Smoke, endPoint=/v1/mimoto/credentials/download, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_SunBirdC_All_Valid_Smoke_sid_code$", "redirect_uri": "$INJIREDIRECTURI$", "code_verifier": "$CODEVERIFIER$", "issuer": "StayProtected", "credential": "InsuranceCredential" }, output={ }, inputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading sunbird credential with valid authorizationCode, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredential_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredential_Reused_AuthorizationCode_Neg, endPoint=/v1/mimoto/credentials/download, role=resident, templateFields=null, input={ "grant_type": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_uin_All_Valid_Smoke_sid_code$", "redirect_uri": "$INJIREDIRECTURI$", "code_verifier": "$CODEVERIFIER$", "issuer": "Mosip", "credential": "MOSIPVerifiableCredential" }, output={ "errors":[ { "errorCode":"RESIDENT-APP-035" } ] }, inputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid expired authorizationCode, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredential_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthLock_InValid_Otp_All, endPoint=/v1/mimoto/req/auth/lock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "111sss@@1", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthLock/createAuthLock, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth Lock a particular UIN with invalid OTP, uniqueIdentifier=TC_Mimoto_AuthLock_02 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthLock_Valid_UIN_All, endPoint=/v1/mimoto/req/auth/lock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthLock/createAuthLock, outputTemplate=mimoto/AuthLock/createAuthLockResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth lock a particular UIN with valid parameters, uniqueIdentifier=TC_Mimoto_AuthLock_01 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthLock_Valid_VID_All, endPoint=/v1/mimoto/req/auth/lock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthLock/createAuthLock, outputTemplate=mimoto/AuthLock/createAuthLockResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth lock a particular VID with valid VID, uniqueIdentifier=TC_Mimoto_AuthLock_04 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthLock_invalidVID_Valid_Otp, endPoint=/v1/mimoto/req/auth/lock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "36363gvb", "individualIdType": "VID", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthLock/createAuthLock, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth lock a particular VID with invalid VID, uniqueIdentifier=TC_Mimoto_AuthLock_06 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthLock_with_invalidUIN_Valid_Otp_sid, endPoint=/v1/mimoto/req/auth/lock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "263738@@#FDCVvb", "individualIdType": "UIN", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthLock/createAuthLock, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth Lock a particular UIN with valid OTP, uniqueIdentifier=TC_Mimoto_AuthLock_03 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthLock_with_invalidVID_Valid_Otp, endPoint=/v1/mimoto/req/auth/lock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "26DBDB@73", "individualIdType": "VID", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthLock/createAuthLock, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth lock a particular VID with invalid OTP, uniqueIdentifier=TC_Mimoto_AuthLock_05 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthUnLock_InValid_OTP_With_VID_All, endPoint=/v1/mimoto/req/auth/unlock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "unlockForSeconds": "1", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "11111@@###1", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthUnLock/createAuthUnLock, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Unlock a particular VID with invalid OTP, uniqueIdentifier=TC_Mimoto_AuthLock_10 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthUnLock_Valid_UIN_All, endPoint=/v1/mimoto/req/auth/unlock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "unlockForSeconds": "1", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthUnLock/createAuthUnLock, outputTemplate=mimoto/AuthUnLock/createAuthUnLockResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth unlock a particular UIN with valid parameters, uniqueIdentifier=TC_Mimoto_AuthLock_07 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthUnLock_Valid_UIN_With_VID_All, endPoint=/v1/mimoto/req/auth/unlock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "unlockForSeconds": "1", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthUnLock/createAuthUnLock, outputTemplate=mimoto/AuthUnLock/createAuthUnLockResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth unlock a particular VID with valid parameters, uniqueIdentifier=TC_Mimoto_AuthLock_08 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AuthUnLock_With_InValid_OTP_All, endPoint=/v1/mimoto/req/auth/unlock, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "unlockForSeconds": "1", "authType": [{auth: "bio-Iris"},{auth: "demo"},{auth: "bio-FACE"}], "otp": "111@@@###hhdhdh111", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/AuthUnLock/createAuthUnLock, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Auth unlock a particular UIN with invalid OTP, uniqueIdentifier=TC_Mimoto_AuthLock_09 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_RequestCredentials_All_Valid_Smoke_with_VID_sid, endPoint=/v1/mimoto/credentialshare/request, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "user": "abc", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/CredentialIssuance/RequestCredentials/reqCredential, outputTemplate=mimoto/CredentialIssuance/RequestCredentials/ReqCredentialResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=requesting credential with valid VID, uniqueIdentifier=TC_Mimoto_RequestCredentials_02 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_RequestCredentials_InValid_Otp_UIN_sid, endPoint=/v1/mimoto/credentialshare/request, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "user": "abc", "otp": "4h4hnn", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/CredentialIssuance/RequestCredentials/reqCredential, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=requesting UIN credential with invalid OTP, uniqueIdentifier=TC_Mimoto_RequestCredentials_03 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_RequestCredentials_InValid_TransactionId_sid, endPoint=/v1/mimoto/credentialshare/request, role=resident, templateFields=null, input={ "transactionID": "4dhn@@##&%", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "user": "abc", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-422" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/CredentialIssuance/RequestCredentials/reqCredential, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=requesting credential with invalid transactionID, uniqueIdentifier=TC_Mimoto_RequestCredentials_04 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_RequestCredentials_InValid_UIN_sid, endPoint=/v1/mimoto/credentialshare/request, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ght56=", "user": "abc", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/CredentialIssuance/RequestCredentials/reqCredential, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=requesting credential with invalid UIN, uniqueIdentifier=TC_Mimoto_RequestCredentials_05 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_RequestCredentials_Invalid_VID_sid_Neg, endPoint=/v1/mimoto/credentialshare/request, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$hfg56", "user": "abc", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Valid_Smoke_sid_vid$", "individualIdType": "VID", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/CredentialIssuance/RequestCredentials/reqCredential, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=requesting credential with invalid VID, uniqueIdentifier=TC_Mimoto_RequestCredentials_06 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_RequestCredentials__All_Valid_Smoke_sid, endPoint=/v1/mimoto/credentialshare/request, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "user": "abc", "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "sendOtp":{ "transactionID": "$TRANSACTIONID$", "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$", "individualIdType": "UIN", "sendOtpReqTemplate": "mimoto/SendOTP/createSendOTP", "sendOtpEndPoint": "/v1/mimoto/req/otp" } }, output={ "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTP/createSendOTPResult" } }, inputTemplate=mimoto/CredentialIssuance/RequestCredentials/reqCredential, outputTemplate=mimoto/CredentialIssuance/RequestCredentials/ReqCredentialResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=requesting credential with all valid parameters, uniqueIdentifier=TC_Mimoto_RequestCredentials_01 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithAutogenIdWithOtpGenerate.test(PostWithAutogenIdWithOtpGenerate.java:100)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_CredentialsStatus_euin_All_Valid_Smoke, endPoint=/v1/mimoto/credentialshare/request/status/{requestId}, role=resident, templateFields=null, input={ "requestId": "$ID:RequestCredentials__All_Valid_Smoke_sid_requestId$" }, output={ "statusCode": "ISSUED" }, inputTemplate=mimoto/CredentialIssuance/CredentialCheckStatus/credentialcheckstatus, outputTemplate=mimoto/CredentialIssuance/CredentialCheckStatus/credentialcheckstatusResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving credential status with valid UIN, uniqueIdentifier=TC_Mimoto_CredentialsStatus_01 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam.test(GetWithParam.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_CredentialsStatus_euin_With_Invalid_RequestId_Neg, endPoint=/v1/mimoto/credentialshare/request/status/{requestId}, role=resident, templateFields=null, input={ "requestId": "$er45" }, output={ "errors": [ { "errorCode": "RES-SER-29" } ] }, inputTemplate=mimoto/CredentialIssuance/CredentialCheckStatus/credentialcheckstatus, outputTemplate=mimoto/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving credential status with invalid requestId, uniqueIdentifier=TC_Mimoto_CreateVID_03 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam.test(GetWithParam.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_CredentialsStatus_euin_With_VID_All_Valid_Smoke, endPoint=/v1/mimoto/credentialshare/request/status/{requestId}, role=resident, templateFields=null, input={ "requestId": "$ID:RequestCredentials_All_Valid_Smoke_with_VID_sid_requestId$" }, output={ "statusCode": "ISSUED" }, inputTemplate=mimoto/CredentialIssuance/CredentialCheckStatus/credentialcheckstatus, outputTemplate=mimoto/CredentialIssuance/CredentialCheckStatus/credentialcheckstatusResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving credential status with valid VID, uniqueIdentifier=TC_Mimoto_CredentialsStatus_02 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.GetWithParam.test(GetWithParam.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_CredentialsStatus_All_Valid_Smoke_euin, endPoint=/v1/mimoto/credentialshare/download, role=resident, templateFields=null, input={ "requestId": "$ID:RequestCredentials__All_Valid_Smoke_sid_requestId$", "individualId": "$ID:AddIdentity_withValidParameters_smoke_Pos_UIN$" }, output= { "Content-Type": "application/pdf" }, inputTemplate=mimoto/CredentialIssuance/DownloadWithReqid/downloadwithreqid, outputTemplate=mimoto/CredentialIssuance/DownloadWithReqid/downloadwithreqidResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Checking credential status with all valid parameters, uniqueIdentifier=TC_Mimoto_DownloadCredential_01 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_CredentialsStatus_StatusCode_InValid_Smoke_euin, endPoint=/v1/mimoto/credentialshare/download, role=resident, templateFields=null, input={ "requestId": "$ID:RequestCredentials__All_Valid_Smoke_sid_requestId$", "individualId": "965337484848041697" }, output=404, inputTemplate=mimoto/CredentialIssuance/DownloadWithReqid/downloadwithreqid, outputTemplate=mimoto/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Checking credential status with invalid StatusCode, uniqueIdentifier=TC_Mimoto_DownloadCredential_02 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_individualOTP_All_Valid_Smoke, endPoint=/v1/mimoto/req/individualId/otp, role=resident, templateFields=null, input={ "transactionID": "$TRANSACTIONID$", "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$" }, output={ }, inputTemplate=mimoto/SendOTPUIN/individualIdOtp, outputTemplate=mimoto/SendOTPUIN/individualIdOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=generating individual OTP with valid parameters, uniqueIdentifier=TC_Mimoto_individualOTP_01 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AidGetIndividualId_Getting_With_Invalid_AID_Neg, endPoint=/v1/mimoto/aid/get-individual-id, role=resident, templateFields=null, input={ "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "transactionID": "$TRANSACTIONID$", "aid": "$yt55g", "sendOtp":{ "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "transactionID": "$TRANSACTIONID$", "sendOtpReqTemplate": "mimoto/SendOTPUIN/individualIdOtp", "sendOtpEndPoint": "/v1/mimoto/req/individualId/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTPUIN/individualIdOtpResult" } }, inputTemplate=mimoto/AidGetIndividualId/aidGetIndividualId, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating individualID with invalid AID, uniqueIdentifier=TC_Mimoto_AidGetIndividualId_02 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AidGetIndividualId_Getting_With_Invalid_Otp_Neg, endPoint=/v1/mimoto/aid/get-individual-id, role=resident, templateFields=null, input={ "otp": "1234", "transactionID": "$TRANSACTIONID$", "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "sendOtp":{ "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "transactionID": "$TRANSACTIONID$", "sendOtpReqTemplate": "mimoto/SendOTPUIN/individualIdOtp", "sendOtpEndPoint": "/v1/mimoto/req/individualId/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-410" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTPUIN/individualIdOtpResult" } }, inputTemplate=mimoto/AidGetIndividualId/aidGetIndividualId, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating individualID with Invalid OTP, uniqueIdentifier=TC_Mimoto_AidGetIndividualId_03 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AidGetIndividualId_Getting_With_Invalid_lenght_Of_AID_Neg, endPoint=/v1/mimoto/aid/get-individual-id, role=resident, templateFields=null, input={ "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "transactionID": "$TRANSACTIONID$", "aid": "2745538921628455389216202302041241544770230204124154278477", "sendOtp":{ "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "transactionID": "$TRANSACTIONID$", "sendOtpReqTemplate": "mimoto/SendOTPUIN/individualIdOtp", "sendOtpEndPoint": "/v1/mimoto/req/individualId/otp" } }, output={ "errors": [ { "errorCode": "RES-SER-457" } ], "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTPUIN/individualIdOtpResult" } }, inputTemplate=mimoto/AidGetIndividualId/aidGetIndividualId, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating individualID with invalid lengh of AID, uniqueIdentifier=TC_Mimoto_AidGetIndividualId_05 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AidGetIndividualId_Getting_With_Valid_Otp_All, endPoint=/v1/mimoto/aid/get-individual-id, role=resident, templateFields=null, input={ "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "transactionID": "$TRANSACTIONID$", "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "sendOtp":{ "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "transactionID": "$TRANSACTIONID$", "sendOtpReqTemplate": "mimoto/SendOTPUIN/individualIdOtp", "sendOtpEndPoint": "/v1/mimoto/req/individualId/otp" } }, output={ "aidStatus": "PROCESSED", "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTPUIN/individualIdOtpResult" } }, inputTemplate=mimoto/AidGetIndividualId/aidGetIndividualId, outputTemplate=mimoto/AidGetIndividualId/aidGetIndividualIdResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating individualID with valid OTP, uniqueIdentifier=TC_Mimoto_AidGetIndividualId_04 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_AidGetIndividualId_Getting_With_Valid_UIN_All, endPoint=/v1/mimoto/aid/get-individual-id, role=resident, templateFields=null, input={ "otp": "$ID:AddIdentity_withValidParameters_smoke_Pos_EMAIL$", "transactionID": "$TRANSACTIONID$", "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "sendOtp":{ "aid": "$ID:AddIdentity_withValidParameters_smoke_Pos_RID$", "transactionID": "$TRANSACTIONID$", "sendOtpReqTemplate": "mimoto/SendOTPUIN/individualIdOtp", "sendOtpEndPoint": "/v1/mimoto/req/individualId/otp" } }, output={ "aidStatus": "PROCESSED", "sendOtpResp":{ "sendOtpResTemplate":"mimoto/SendOTPUIN/individualIdOtpResult" } }, inputTemplate=mimoto/AidGetIndividualId/aidGetIndividualId, outputTemplate=mimoto/AidGetIndividualId/aidGetIndividualIdResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating AID status with valid AID, uniqueIdentifier=TC_Mimoto_AidGetIndividualId_01 |
| Output Validation Exception |
org.testng.SkipException: OTP feature not supported. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:115)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_Valid_vid_All_Smoke, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"}] }, output={ }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/BindingOtp/BindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with valid VID, uniqueIdentifier=TC_Mimoto_BindingOtp_02 |
| Output Validation Exception |
org.testng.SkipException: known issue. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:128)
at io.mosip.testrig.apirig.mimoto.testscripts.SimplePost.test(SimplePost.java:87)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Empty_OtpChannel_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": "" }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel being empty, uniqueIdentifier=TC_Mimoto_BindingOtp_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Empty_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: ""}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel being empty, uniqueIdentifier=TC_Mimoto_BindingOtp_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Empty_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with empty request time, uniqueIdentifier=TC_Mimoto_BindingOtp_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Empty_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with individualId missing, uniqueIdentifier=TC_Mimoto_BindingOtp_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Future_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with future request time, uniqueIdentifier=TC_Mimoto_BindingOtp_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Invalid_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "sdsgsg"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with invalid OTP channel, uniqueIdentifier=TC_Mimoto_BindingOtp_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Invalid_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with invalid request time, uniqueIdentifier=TC_Mimoto_AuthLock_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Invalid_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "@#DSDFD@#", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with invalid UIN, uniqueIdentifier=TC_Mimoto_BindingOtp_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Missing_OtpChannel_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$" }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel missing, uniqueIdentifier=TC_Mimoto_BindingOtp_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Missing_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$" }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel missing, uniqueIdentifier=TC_Mimoto_BindingOtp_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Missing_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with missing request time, uniqueIdentifier=TC_Mimoto_BindingOtp_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Missing_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID without individualId attribute, uniqueIdentifier=TC_Mimoto_BindingOtp_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Null_OtpChannel_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": "null" }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel being empty, uniqueIdentifier=TC_Mimoto_BindingOtp_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Null_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "null"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel value being null, uniqueIdentifier=TC_Mimoto_BindingOtp_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Null_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "null", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with individualId value as null, uniqueIdentifier=TC_Mimoto_BindingOtp_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_Past_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with past request time, uniqueIdentifier=TC_Mimoto_BindingOtp_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_UIN_SpaceSeparated_otpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "E M A I L"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with OTP channel value been spaced in between, uniqueIdentifier=TC_Mimoto_BindingOtp_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_Valid_UIN_All_Smoke, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"}] }, output={ }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/BindingOtp/BindingOtpResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with valid UIN, uniqueIdentifier=TC_Mimoto_BindingOtp_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Empty_OtpChannel_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": "" }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with OTP channel values empty, uniqueIdentifier=TC_Mimoto_BindingOtp_30 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Empty_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: ""}] }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with empty OTP channel values, uniqueIdentifier=TC_Mimoto_BindingOtp_27 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Empty_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with request time empty, uniqueIdentifier=TC_Mimoto_BindingOtp_36 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Empty_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_identifier" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with empty VID, uniqueIdentifier=TC_Mimoto_BindingOtp_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Future_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with future request time, uniqueIdentifier=TC_Mimoto_BindingOtp_34 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Invalid_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "sdsgsg"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with invalid OTP channel, uniqueIdentifier=TC_Mimoto_BindingOtp_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Invalid_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "2022-11-08T06:35:53", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with invalid request time, uniqueIdentifier=TC_Mimoto_BindingOtp_32 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Invalid_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "@#DSDFD@#", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with invalid VID, uniqueIdentifier=TC_Mimoto_BindingOtp_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Missing_OtpChannel_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$" }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with OTP channel values missing, uniqueIdentifier=TC_Mimoto_BindingOtp_29 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Missing_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$" }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with missing OTP channel values, uniqueIdentifier=TC_Mimoto_BindingOtp_26 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Missing_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with request time missing, uniqueIdentifier=TC_Mimoto_BindingOtp_35 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Missing_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with missing VID, uniqueIdentifier=TC_Mimoto_BindingOtp_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Null_OtpChannel_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": "null" }, output={ "errors": [ { "errorCode": "invalid_otp_channel" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with OTP channel values as null, uniqueIdentifier=TC_Mimoto_BindingOtp_31 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Null_OtpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "null"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with OTP channel values as null, uniqueIdentifier=TC_Mimoto_BindingOtp_28 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Null_individualId_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "null", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a individualID with invalid VID, uniqueIdentifier=TC_Mimoto_BindingOtp_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_Past_RequestTime_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"}] }, output={ "errors": [ { "errorCode": "invalid_request" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with past request time, uniqueIdentifier=TC_Mimoto_BindingOtp_33 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_BindingOtp_vid_SpaceSeparated_otpChannels_Neg, endPoint=/v1/mimoto/binding-otp, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "E M A I L"}] }, output={ "errors": [ { "errorCode": "RESIDENT-APP-011" } ] }, inputTemplate=mimoto/BindingOtp/BindingOtp, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OTP for binding a VID with OTP channel value been spaced in between, uniqueIdentifier=TC_Mimoto_BindingOtp_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_OTP_Valid_Smoke, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/WalletBinding/WalletBindingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with valid VID, uniqueIdentifier=TC_Mimoto_WalletBinding_02 |
| Output Validation Exception |
org.testng.SkipException: known issue. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:128)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithBodyWithOtpGenerate.test(PostWithBodyWithOtpGenerate.java:96)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Empty_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VC with empty authfactortype, uniqueIdentifier=TC_Mimoto_WalletBinding_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Empty_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_length" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VC with empty challenge, uniqueIdentifier=TC_Mimoto_WalletBinding_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Empty_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VC with empty formate, uniqueIdentifier=TC_Mimoto_WalletBinding_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Empty_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with empty individualId, uniqueIdentifier=TC_Mimoto_WalletBinding_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Empty_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with empty requestime, uniqueIdentifier=TC_Mimoto_WalletBinding_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Empty_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with empty authFactorType1, uniqueIdentifier=TC_Mimoto_WalletBinding_30 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Empty_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with empty format1, uniqueIdentifier=TC_Mimoto_WalletBinding_35 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_FutureVal_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with future request time, uniqueIdentifier=TC_Mimoto_WalletBinding_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Invalid_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "dfg5", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VC with invalid authfactortype, uniqueIdentifier=TC_Mimoto_WalletBinding_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Invalid_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "gd5$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VC with invalid challenge, uniqueIdentifier=TC_Mimoto_WalletBinding_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Invalid_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "GT$r5", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VC with invalid formate, uniqueIdentifier=TC_Mimoto_WalletBinding_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Invalid_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$tyhg", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,binding_auth_failed, kycFields=null, description=Generating OTP to bind VC with invalid individualId, uniqueIdentifier=TC_Mimoto_WalletBinding_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Invalid_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "asdf$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with invalid request time, uniqueIdentifier=TC_Mimoto_WalletBinding_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Invalid_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "hy$5", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with invalid authFactorType1, uniqueIdentifier=TC_Mimoto_WalletBinding_28 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Invalid_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "hju$5", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with invalid format1, uniqueIdentifier=TC_Mimoto_WalletBinding_33 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Invalid_publicKey_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "ghj$4", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "RESIDENT-APP-028" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with invalid publickey, uniqueIdentifier=TC_Mimoto_WalletBinding_38 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Missing_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "$REMOVE$", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VC with missing authfactortype, uniqueIdentifier=TC_Mimoto_WalletBinding_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Missing_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$REMOVE$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_length" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VC with missing challenge, uniqueIdentifier=TC_Mimoto_WalletBinding_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Missing_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "$REMOVE$", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VC with missing formate, uniqueIdentifier=TC_Mimoto_WalletBinding_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Missing_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with individualId being missing, uniqueIdentifier=TC_Mimoto_WalletBinding_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Missing_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$REMOVE$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with missing requestime, uniqueIdentifier=TC_Mimoto_WalletBinding_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Missing_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "$REMOVE$", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with missing authFactorType1, uniqueIdentifier=TC_Mimoto_WalletBinding_29 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Missing_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "$REMOVE$", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with missing format1, uniqueIdentifier=TC_Mimoto_WalletBinding_34 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Missing_publicKey_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$REMOVE$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "RESIDENT-APP-028" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with missing publickey, uniqueIdentifier=TC_Mimoto_WalletBinding_40 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Null_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "null", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VC with authfactortype value being just null, uniqueIdentifier=TC_Mimoto_WalletBinding_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Null_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "null", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with challenge value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Null_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "null", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VC with formate value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_27 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Null_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "null", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,binding_auth_failed, kycFields=null, description=Generating OTP to bind VC with individualId being null, uniqueIdentifier=TC_Mimoto_WalletBinding_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Null_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "null", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with authFactorType1 value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_32 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Null_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "null", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with format1 value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_37 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_Null_publicKey_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "null", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "RESIDENT-APP-028" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with null as publickey, uniqueIdentifier=TC_Mimoto_WalletBinding_39 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_OTP_Valid_Smoke, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/WalletBinding/WalletBindingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with valid UIN, uniqueIdentifier=TC_Mimoto_WalletBinding_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_PastVal_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with past request time, uniqueIdentifier=TC_Mimoto_WalletBinding_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_SpaceVal_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": " ", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VC with authfactortype value being just space, uniqueIdentifier=TC_Mimoto_WalletBinding_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_SpaceVal_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": " ", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_length" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VC with challenge value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_SpaceVal_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": " ", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VC with formate value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_26 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_SpaceVal_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": " ", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with individualId value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_SpaceVal_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": " ", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with authFactorType1 value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_31 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_uin_SpaceVal_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": " ", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:AddIdentity_Binding_smoke_Pos_UIN$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VC with format1 value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_36 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Empty_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VID VC with empty authfactortype, uniqueIdentifier=TC_Mimoto_WalletBinding_52 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Empty_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VID VC with empty challenge, uniqueIdentifier=TC_Mimoto_WalletBinding_58 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Empty_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VID VC with empty formate, uniqueIdentifier=TC_Mimoto_WalletBinding_63 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Empty_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with empty individualId, uniqueIdentifier=TC_Mimoto_WalletBinding_47 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Empty_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with empty request time, uniqueIdentifier=TC_Mimoto_WalletBinding_44 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Empty_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with empty authFactorType1, uniqueIdentifier=TC_Mimoto_WalletBinding_68 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Empty_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with empty format1, uniqueIdentifier=TC_Mimoto_WalletBinding_73 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_FutureVal_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "2033-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with future request time, uniqueIdentifier=TC_Mimoto_WalletBinding_43 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Invalid_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "dfg5", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VID VC with invalid authfactortype, uniqueIdentifier=TC_Mimoto_WalletBinding_51 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Invalid_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "gd5$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VID VC with invalid challenge, uniqueIdentifier=TC_Mimoto_WalletBinding_56 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Invalid_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "GT$r5", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with invalid formate, uniqueIdentifier=TC_Mimoto_WalletBinding_61 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Invalid_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$tyhg", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,binding_auth_failed, kycFields=null, description=Generating OTP to bind vid VC with invalid individualId, uniqueIdentifier=TC_Mimoto_WalletBinding_46 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Invalid_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "asdf$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with invalid request time, uniqueIdentifier=TC_Mimoto_WalletBinding_41 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Invalid_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "hy$5", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with invalid authFactorType1, uniqueIdentifier=TC_Mimoto_WalletBinding_66 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Invalid_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "hju$5", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with invalid format1, uniqueIdentifier=TC_Mimoto_WalletBinding_71 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Invalid_publicKey_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "ghj$4", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "RESIDENT-APP-028" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with invalid publickey, uniqueIdentifier=TC_Mimoto_WalletBinding_76 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Missing_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "$REMOVE$", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VID VC with missing authfactortype, uniqueIdentifier=TC_Mimoto_WalletBinding_53 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Missing_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$REMOVE$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VID VC with missing challenge, uniqueIdentifier=TC_Mimoto_WalletBinding_57 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Missing_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "$REMOVE$", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VID VC with missing formate, uniqueIdentifier=TC_Mimoto_WalletBinding_62 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Missing_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$REMOVE$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with missing individualId, uniqueIdentifier=TC_Mimoto_WalletBinding_49 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Missing_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$REMOVE$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with missing request time, uniqueIdentifier=TC_Mimoto_WalletBinding_45 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Missing_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "$REMOVE$", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with missing authFactorType1, uniqueIdentifier=TC_Mimoto_WalletBinding_67 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Missing_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "$REMOVE$", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with missing format1, uniqueIdentifier=TC_Mimoto_WalletBinding_72 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Missing_publicKey_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$REMOVE$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "RESIDENT-APP-028" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with missing publickey, uniqueIdentifier=TC_Mimoto_WalletBinding_78 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Null_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "null", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with authfactortype value being just null, uniqueIdentifier=TC_Mimoto_WalletBinding_55 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Null_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "null", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with challenge value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_60 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Null_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "null", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with formate value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_65 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Null_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "null", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "IDA-MLC-009" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=IDA-MLC-009,binding_auth_failed, kycFields=null, description=Generating OTP to bind vid VC with null individualId, uniqueIdentifier=TC_Mimoto_WalletBinding_48 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Null_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "null", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with authFactorType1 value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_70 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Null_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "null", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with format1 value having null, uniqueIdentifier=TC_Mimoto_WalletBinding_75 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_Null_publicKey_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "null", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "RESIDENT-APP-028" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with null as publickey, uniqueIdentifier=TC_Mimoto_WalletBinding_77 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_PastVal_RequestTime_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "2022-11-07T06:51:30.195Z", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_request" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind vid VC with past request time, uniqueIdentifier=TC_Mimoto_WalletBinding_42 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_SpaceVal_AuthFactorType_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": " ", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_auth_factor_type, kycFields=null, description=Generating OTP to bind VID VC with authfactortype value being just space, uniqueIdentifier=TC_Mimoto_WalletBinding_54 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_SpaceVal_Challenge_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": " ", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge, kycFields=null, description=Generating OTP to bind VID VC with challenge value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_59 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_SpaceVal_Formate_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": " ", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=invalid_challenge_format, kycFields=null, description=Generating OTP to bind VID VC with formate value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_64 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_SpaceVal_IndividualId_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": " ", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_individual_id" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with individualId value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_50 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_SpaceVal_authFactorType1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": " ", "format1": "jwt", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with authFactorType1 value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_69 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_WalletBinding_vid_SpaceVal_format1_Neg, endPoint=/v1/mimoto/wallet-binding, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "authFactorType": "OTP", "challenge": "$ID:AddIdentity_Binding_smoke_Pos_EMAIL$", "format": "alpha-numeric", "authFactorType1": "WLA", "format1": " ", "publicKey": "$PUBLICKEYFORBINDING$", "sendOtp":{ "requestTime": "$TIMESTAMP$", "individualId": "$ID:Generate_Perpetual_VID_Binding_Valid_Smoke_sid_VID$", "otpChannels": [{channel: "EMAIL"},{channel: "PHONE"}], "sendOtpReqTemplate": "mimoto/BindingOtp/BindingOtp", "sendOtpEndPoint": "/v1/mimoto/binding-otp" } }, output={ "errors": [ { "errorCode": "invalid_auth_factor_type_or_challenge_format" } ], "sendOtpResp": { "sendOtpResTemplate":"mimoto/BindingOtp/BindingOtpResult" } }, inputTemplate=mimoto/WalletBinding/WalletBinding, outputTemplate=mimoto/error, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating OTP to bind VID VC with format1 value having space, uniqueIdentifier=TC_Mimoto_WalletBinding_74 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetAllIssuers_All_Valid_Smoke, endPoint=/v1/mimoto/issuers, role=resident, templateFields=null, input={ }, output={ }, inputTemplate=mimoto/GetAllIssuers/GetAllIssuers, outputTemplate=mimoto/GetAllIssuers/GetAllIssuersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving issuers with all valid parameters, uniqueIdentifier=TC_Mimoto_GetAllIssuers_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetAllIssuers_Invalid_Issuer_Neg, endPoint=/v1/mimoto/issuers/invalid, role=resident, templateFields=null, input={ }, output={ "errors":[ { "errorCode":"RESIDENT-APP-035" } ] }, inputTemplate=mimoto/GetAllIssuers/GetAllIssuers, outputTemplate=mimoto/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving invalid issuer, uniqueIdentifier=TC_Mimoto_GetAllIssuers_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetAllIssuers_Specific_Issuer_All_Valid_Smoke, endPoint=/v1/mimoto/issuers/Mosip, role=resident, templateFields=null, input={ }, output={ }, inputTemplate=mimoto/GetAllIssuers/GetAllIssuers, outputTemplate=mimoto/GetAllIssuers/GetAllIssuersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all specific issuer with all valid parameters, uniqueIdentifier=TC_Mimoto_GetAllIssuers_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetIssuerWellKnown_All_Valid_Smoke, endPoint=/v1/mimoto/issuers/{issuerId}/well-known-proxy, role=resident, templateFields=null, input={ "issuerId": "Mosip", "credentialType": "$REMOVE$" }, output={ }, inputTemplate=mimoto/GetIssuerWellKnown/GetIssuerWellKnown, outputTemplate=mimoto/GetIssuerWellKnown/GetIssuerWellKnownResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating the issuer well known with all valid parameters, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GoogleLoginToken_EmptyToken_Neg, endPoint=/v1/mimoto/auth/google/token-login, role=userDefinedCookie, templateFields=null, input={ "cookie": "" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Authorization/GoogleLoginToken/GoogleLoginToken, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating the sesion token for google login with expired token and expects it to fail, uniqueIdentifier=TC_Mimoto_GoogleLoginToken_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GoogleLoginToken_ExpiredToken_Neg, endPoint=/v1/mimoto/auth/google/token-login, role=userDefinedCookie, templateFields=null, input={ "cookie": "eyJhbGciOiJSUzI1NiIsImtpZCI6IjFiYjc3NGJkODcyOWVhMzhlOWMyZmUwYzY0ZDJjYTk0OGJmNjZmMGYiLCJ0eXAiOiJKV1QifQ.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.YGH3pgVvZoXyXS_eUPLmul5AXMdAdVaAoJRBJty_ZYBy7oKT7FGKwhJ9bLhXLiRG031noCaM-3EYv2N2oezvApuOGYM6xK5Mb6WdGzv-y0oR-00wniTTbuUEtgZGxPunZ2lfrI6WwkIq8JHhFh1_l4SnRGYfRqNA-vhLNMfcZsm0yG9NAt6TWgHEqy_JtMXSQTsvLfLijCLOqZCfQuTDqzk5EhtGaEMtppPN_au-Xc8fTDhY0nZtWTQ2262nqLXGSomika66dKH1SU50DtQEEdtz8Cbo_li5S4hSV1nDa7MzbIgiVqqN6fFalxRy4kvvvvaWNj7U46DsKjunINoNMQ" }, output={ "errorCode": "invalid_token" }, inputTemplate=mimoto/LoginFlow/Authorization/GoogleLoginToken/GoogleLoginToken, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating the sesion token for google login with expired token and expects it to fail, uniqueIdentifier=TC_Mimoto_GoogleLoginToken_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GoogleLoginToken_InvalidToken_Neg, endPoint=/v1/mimoto/auth/google/token-login, role=userDefinedCookie, templateFields=null, input={ "cookie": "invalid" }, output={ "errorCode": "invalid_token" }, inputTemplate=mimoto/LoginFlow/Authorization/GoogleLoginToken/GoogleLoginToken, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating the sesion token for google login with invalid IDT token and expects it to fail, uniqueIdentifier=TC_Mimoto_GoogleLoginToken_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GoogleLoginToken_Invalid_Provider_Neg, endPoint=/v1/mimoto/auth/invalid/token-login, role=userDefinedCookie, templateFields=null, input={ "cookie": "$GOOGLE_IDT_TOKEN$" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Authorization/GoogleLoginToken/GoogleLoginToken, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating the sesion token for google login with invalid provider, uniqueIdentifier=TC_Mimoto_GoogleLoginToken_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GoogleLoginToken_all_Valid_Smoke, endPoint=/v1/mimoto/auth/google/token-login, role=userDefinedCookie, templateFields=null, input={ "cookie": "$GOOGLE_IDT_TOKEN$" }, output={ "responseCode": "200" }, inputTemplate=mimoto/LoginFlow/Authorization/GoogleLoginToken/GoogleLoginToken, outputTemplate=mimoto/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Creating the sesion token for google login, uniqueIdentifier=TC_Mimoto_GoogleLoginToken_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetUserProfile_all_Valid_Smoke, endPoint=/v1/mimoto/users/me, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "displayName": "Mosip test Cyberpwn", "email": "mosiptestcyberpwn@gmail.com" }, inputTemplate=mimoto/LoginFlow/Users/GetUserProfile/GetUserProfile, outputTemplate=mimoto/LoginFlow/Users/GetUserProfile/GetUserProfileResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get the user profile details for the session login, uniqueIdentifier=TC_Mimoto_GetUserProfile_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_EmptyWalletName_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with empty wallet name and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_Empty_WalletPin_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWalletNeg4", "walletPin": "", "confirmWalletPin": "" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with empty wallet pin and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_InvalidWalletName_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "********", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with invalid wallet name and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_MissingWalletName_Valid, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "$REMOVE$", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "responseCode": "200" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with missing wallet name, uniqueIdentifier=TC_Mimoto_CreateWallet_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_Missing_WalletPin_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWalletNeg4", "walletPin": "$REMOVE$", "confirmWalletPin": "123456" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with missing wallet pin and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_MoreThan50Characters_WalletName_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "abcdefghijklmnopqrstuvwxyz1234567890abcdefghijklmnopqrstuvwxyz", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with more than 50 characters in wallet name and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_MoreThan6Digits_WalletPin_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWalletNeg3", "walletPin": "12345678", "confirmWalletPin": "12345678" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with wallet pin with more than 6 digits and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_SameName_Valid, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWallet", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "walletName": "AutomationWallet" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWalletResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet for the same user with same name with successful login, uniqueIdentifier=TC_Mimoto_CreateWallet_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_SessionExpired_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "OGYwNWI5YWQtZjg0MS00NmM2LWJiZTgtOGRmMWYwMGYzNzcy", "cookieName": "SESSION", "walletName": "AutomationWalletNeg2", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with expired session and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_SpaceInWalletName_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": " ", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with space in wallet name and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_Space_WalletPin_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWalletNeg4", "walletPin": " ", "confirmWalletPin": " " }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with space in wallet pin and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_SpecialCharacters_WalletPin_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWalletNeg4", "walletPin": "^%$@*!", "confirmWalletPin": "^%$@*!" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with special characters in wallet pin and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_StringValue_WalletPin_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWalletNeg4", "walletPin": "abcdef", "confirmWalletPin": "abcdef" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with string value in wallet pin and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_WalletNameInNumbers_Valid, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "5675441", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "walletName": "5675441" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWalletResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with numbers as wallet name, uniqueIdentifier=TC_Mimoto_CreateWallet_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_WalletNameInSpecialCharacters_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "%$!*&^", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with special characters as wallet name and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_WalletNameWithSpaces_valid, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "Automation Wallet", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "walletName": "Automation Wallet" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWalletResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with wallet name contains spaces, uniqueIdentifier=TC_Mimoto_CreateWallet_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_WalletPin_ConfirmWalletPin_Mismatch_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWalletNeg4", "walletPin": "123456", "confirmWalletPin": "654321" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with wallet pin and confirm wallet pin mismatch and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_WithoutLogin_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "withoutLogin", "cookieName": "SESSION", "walletName": "AutomationWalletNeg1", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Creating new wallet without login and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_WithoutUnlock_all_Valid_Smoke_sid, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWalletWithoutUnlock", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "walletName": "AutomationWalletWithoutUnlock" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWalletResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet for the same user with successful login, uniqueIdentifier=TC_Mimoto_CreateWallet_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_Without_WalletPin_And_WalletName_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "$REMOVE$", "walletPin": "$REMOVE$", "confirmWalletPin": "$REMOVE$" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet without wallet pin and wallet name and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_all_Valid_Smoke_sid, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWallet", "walletPin": "123456", "confirmWalletPin": "123456" }, output={ "walletName": "AutomationWallet" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWalletResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with successful login, uniqueIdentifier=TC_Mimoto_CreateWallet_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_CreateWallet_invalid_WalletPin_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletName": "AutomationWalletNeg4", "walletPin": "12345", "confirmWalletPin": "12345" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/CreateWallet/CreateWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating new wallet with invalid wallet pin and expects to fail, uniqueIdentifier=TC_Mimoto_CreateWallet_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_UnlockWallet_Incorrect_WalletPin_Neg, endPoint=/v1/mimoto/wallets/{walletId}/unlock, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "walletPin": "876532" }, output={ "errorCode": "invalid_pin" }, inputTemplate=mimoto/LoginFlow/Wallet/UnlockWallet/UnlockWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Unlock the wallet with incorrect wallet Pin and expects it to fail, uniqueIdentifier=TC_Mimoto_UnlockWallet_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_UnlockWallet_Invalid_WalletId_Neg, endPoint=/v1/mimoto/wallets/{walletId}/unlock, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "invalid", "walletPin": "123456" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/UnlockWallet/UnlockWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Unlock the wallet with invalid wallet id and expects it to fail, uniqueIdentifier=TC_Mimoto_UnlockWallet_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_UnlockWallet_Invalid_WalletPin_Neg, endPoint=/v1/mimoto/wallets/{walletId}/unlock, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "walletPin": "87653" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/UnlockWallet/UnlockWallet, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Unlock the wallet with invalid wallet Pin and expects it to fail, uniqueIdentifier=TC_Mimoto_UnlockWallet_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_UnlockWallet_WithoutLogin_Neg, endPoint=/v1/mimoto/wallets/{walletId}/unlock, role=userDefinedCookie, templateFields=null, input={ "cookie": "withoutLogin", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "walletPin": "123456" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/Wallet/UnlockWallet/UnlockWallet, outputTemplate=mimoto/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Unlock the wallet without login session and expects it to fail, uniqueIdentifier=TC_Mimoto_UnlockWallet_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_UnlockWallet_all_Valid_Smoke, endPoint=/v1/mimoto/wallets/{walletId}/unlock, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "walletPin": "123456" }, output={ "walletName": "$ID:CreateWallet_all_Valid_Smoke_sid_walletName$", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$" }, inputTemplate=mimoto/LoginFlow/Wallet/UnlockWallet/UnlockWallet, outputTemplate=mimoto/LoginFlow/Wallet/UnlockWallet/UnlockWalletResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Unlock the wallet that is created, uniqueIdentifier=TC_Mimoto_UnlockWallet_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$GETCLIENTIDFORMOSIPIDFROMMIMOTOACTUATOR$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$INJIREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating Oauth's details with all valid parameters, uniqueIdentifier=TC_Mimoto_OAuthDetailsRequestForGoogleLogin_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_sid_ForNeg, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$GETCLIENTIDFORMOSIPIDFROMMIMOTOACTUATOR$", "scope": "mosip_identity_vc_ldp", "responseType": "code", "redirectUri": "$INJIREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:generated-code mosip:idp:acr:linked-wallet mosip:idp:acr:biometrics", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/OAuthDetailsRequest/OAuthDetailsRequest, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/OAuthDetailsRequest/OAuthDetailsRequestResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating Oauth's details with all valid parameters for Neg scenario, uniqueIdentifier=TC_Mimoto_OAuthDetailsRequestForGoogleLogin_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_AuthenticateUserIDPForGoogleLogin_uin_Otp_Valid_ForNeg, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_sid_ForNeg_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_sid_ForNeg_transactionId$", "individualId": "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_sid_ForNeg_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_sid_ForNeg_transactionId$", "individualId": "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "mimoto/SendOtpEsignet/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/AuthenticateUser/AuthenticateUser, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user to download credentials with all valid parameters for neg scenario, uniqueIdentifier=TC_Mimoto_AuthenticateUserForGoogleLogin_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_AuthenticateUserIDPForGoogleLogin_uin_Otp_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_EMAIL$", "sendOtp":{ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_Smoke_sid_transactionId$", "individualId": "$ID:AddIdentity_downloadIssuerCredential_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "mimoto/SendOtpEsignet/SendOtp", "sendOtpEndPoint": "/v1/esignet/authorization/send-otp" } }, output={ "sendOtpResp":{ "maskedMobile": "$IGNORE$", "sendOtpResTemplate":"esignet/SendOtp/SendOtpResult", "maskedEmail": "$IGNORE$" } }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/AuthenticateUser/AuthenticateUser, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/AuthenticateUser/AuthenticateUserResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticate user to download credentials with all valid parameters, uniqueIdentifier=TC_Mimoto_AuthenticateUserForGoogleLogin_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_Smoke_sid_transactionId$" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/AuthorizationCode/AuthorizationCode, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/AuthorizationCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate authorization code to download credential issuer, uniqueIdentifier=TC_Mimoto_AuthorizationCodeForGoogleLogin_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_sid_ForNeg_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_all_Valid_sid_ForNeg_transactionId$" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/AuthorizationCode/AuthorizationCode, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/AuthorizationCode/AuthorizationCodeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate authorization code to download credential issuer for Neg scenario, uniqueIdentifier=TC_Mimoto_AuthorizationCodeForGoogleLogin_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NullInWallet_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with null value in wallet id along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_05 |
| Output Validation Exception |
org.testng.SkipException: known issue. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:128)
at io.mosip.testrig.apirig.mimoto.testscripts.PostWithPathParamsHeadersAndCookieForAutoGenId.test(PostWithPathParamsHeadersAndCookieForAutoGenId.java:84)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_Smoke_sid_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "issuerDisplayName": "National Identity Department", "credentialTypeDisplayName": "MOSIP National ID" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with all valid parameters along with google login, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_DownloadSameVC_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"credential_download_error" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading same credential with all valid parameters along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyCodeVerifier_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with empty code verifier along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyCode_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with empty code along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyCredential_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with empty credential along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_33 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyGrantType_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with empty grant type along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyIssuer_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with empty issuer along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_28 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyRedirectUri_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with empty redirect uri along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_EmptyRequestBody_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "$REMOVE$", "code": "$REMOVE$", "redirectUri": "$REMOVE$", "codeVerifier": "$REMOVE$", "issuer": "$REMOVE$", "credentialConfigurationId": "$REMOVE$", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with empty request body with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_37 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidCodeVerifier_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "invalid", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid code verifier along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidCode_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "invalid", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid code along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidCredential_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "invalid", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid credential along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_32 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidGrantType_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "invalid", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid grant type along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidIssuer_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "invalid", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid issuer along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_27 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidRedirectUri_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "invalid", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid redirect uri along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_InvalidWallet_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "invalid-wallet-id", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with invalid wallet id along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_MissingCodeVerifier_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$REMOVE$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with missing code verifier along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_MissingCode_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$REMOVE$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with missing code along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_MissingCredential_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "$REMOVE$", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with missing credential along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_35 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_MissingGrantType_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "$REMOVE$", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with missing grant type along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_MissingIssuer_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "$REMOVE$", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with missing issuer along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_30 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_MissingRedirectUri_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$REMOVE$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with missing redirect uri along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericGrantType_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "5454453", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with numeric grant type along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericInCodeVerifier_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "8665542", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with numeric in code verifier along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_26 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericInCode_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "7554432", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with numeric in code along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericInCredential_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "655671754", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with numeric in credential along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_36 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericInIssuer_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "86654556", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with numeric in issuer along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_31 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericInRedirectUri_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "8654678", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with numeric in redirect uri along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_NumericValueInWallet_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "145672", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with numeric value in wallet id along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInCodeVerifier_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": " ", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with space in code verifier along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInCode_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with space in code along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInCredential_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": " ", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with space in credential along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_34 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInGrantType_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": " ", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with space in grant type along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInIssuer_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": " ", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with space in issuer along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_29 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInRedirectUri_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": " ", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with space in redirect uri along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_SpaceInWallet_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": " ", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with sapce value in wallet id along with google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_WithSessionExpired_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "OGYwNWI5YWQtZjg0MS00NmM2LWJiZTgtOGRmMWYwMGYzNzcy", "cookieName": "SESSION" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Downloading credential with expired google login session and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_40 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_With_Diff_Active_session_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_WithoutUnlock_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading credential with all valid parameters along with google login when a different session is active and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_38 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_WithoutLogin_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_GoogleLogin_uin_All_Valid_sid_ForNeg_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "Mosip", "credentialConfigurationId": "MOSIPVerifiableCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "withoutLogin", "cookieName": "SESSION" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Downloading credential without google login and expects to fail, uniqueIdentifier=TC_Mimoto_DownloadIssuerCredentialWithGoogleLogin_39 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_MultipleVC_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$GETCLIENTIDFORINSURANCEFROMMIMOTOACTUATOR$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$INJIREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Getting auth details for downloading multiple sunbird credentials with google login, uniqueIdentifier=TC_Mimoto_OAuthDetailsRequestSunBirdCForGoogleLogin_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_all_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/v2/oauth-details, role=resident, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "clientId": "$GETCLIENTIDFORINSURANCEFROMMIMOTOACTUATOR$", "scope": "sunbird_rc_insurance_vc_ldp", "responseType": "code", "redirectUri": "$INJIREDIRECTURI$", "display": "popup", "prompt": "login", "acrValues": "mosip:idp:acr:knowledge", "nonce": "$UNIQUENONCEVALUEFORESIGNET$", "state": "eree2311", "claimsLocales": "en", "codeChallenge": "$CODECHALLENGE$", "codeChallengeMethod": "S256" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdC, outputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/OAuthDetailsRequestSunBirdC/OAuthDetailsRequestSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Getting auth details for downloading sunbird credentials with google login, uniqueIdentifier=TC_Mimoto_OAuthDetailsRequestSunBirdCForGoogleLogin_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_AuthenticateUserSunBirdCForGoogleLogin_SunBirdC_MultipleVC_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_MultipleVC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_MultipleVC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "$SUNBIRDINSURANCEAUTHFACTORTYPE$", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/AuthenticateUserSunBirdC/AuthenticateUserSunBirdC, outputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/AuthenticateUserSunBirdC/AuthenticateUserSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticating user for downloading stayprotected credential with google login, uniqueIdentifier=TC_Mimoto_AuthenticateUserSunBirdCForGoogleLogin_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_AuthenticateUserSunBirdCForGoogleLogin_SunBirdC_Valid_Smoke, endPoint=/v1/esignet/authorization/authenticate, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_all_Valid_Smoke_sid_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "$SUNBIRDINSURANCEAUTHFACTORTYPE$", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", "format": "base64url-encoded-json" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/AuthenticateUserSunBirdC/AuthenticateUserSunBirdC, outputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/AuthenticateUserSunBirdC/AuthenticateUserSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Authenticating user for downloading stayprotected credential with google login, uniqueIdentifier=TC_Mimoto_AuthenticateUserSunBirdCForGoogleLogin_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_AuthorizationCode_SunBirdCForGoogleLogin_MultipleVC_SunBirdC_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_MultipleVC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_MultipleVC_all_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "sunbird_rc_insurance_vc_ldp"}] }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/AuthorizationCodeSunBirdC/AuthorizationCodeSunBirdC, outputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/AuthorizationCodeSunBirdC/AuthorizationCodeSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating authorization code for downloading multiple sunbird VC with google login, uniqueIdentifier=TC_Mimoto_AuthorizationCodeSunBirdC_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_AuthorizationCode_SunBirdCForGoogleLogin_SunBirdC_All_Valid_Smoke_sid, endPoint=/v1/esignet/authorization/auth-code, role=resident, templateFields=null, input={ "encodedHash": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_GoogleLogin_SunBirdC_all_Valid_Smoke_sid_transactionId$", "permittedAuthorizeScopes": [{scope: "sunbird_rc_insurance_vc_ldp"}] }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/AuthorizationCodeSunBirdC/AuthorizationCodeSunBirdC, outputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/AuthorizationCodeSunBirdC/AuthorizationCodeSunBirdCResult, restMethod=post, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating authorization code for downloading sunbird VC with google login, uniqueIdentifier=TC_Mimoto_AuthorizationCodeSunBirdC_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadMultipleStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_All_Valid_Smoke_sid, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_SunBirdCForGoogleLogin_MultipleVC_SunBirdC_All_Valid_Smoke_sid_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "StayProtected", "credentialConfigurationId": "InsuranceCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "acceptLanguage": "" }, output={ "issuerDisplayName": "StayProtected Insurance", "credentialTypeDisplayName": "Health Insurance" }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading Multiple sunbird credential for policy already downloaded with valid authorizationCode after google login, uniqueIdentifier=TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_All_Valid_Smoke_sid, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_SunBirdCForGoogleLogin_SunBirdC_All_Valid_Smoke_sid_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "StayProtected", "credentialConfigurationId": "InsuranceCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "acceptLanguage": "en" }, output={ "issuerDisplayName": "StayProtected Insurance", "credentialTypeDisplayName": "Health Insurance" }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/DownloadIssuerCredential/DownloadIssuerCredentialResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading sunbird credential with valid authorizationCode after google login, uniqueIdentifier=TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_InvalidLocale_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_SunBirdCForGoogleLogin_SunBirdC_All_Valid_Smoke_sid_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "StayProtected", "credentialConfigurationId": "InsuranceCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "acceptLanguage": "oo" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading sunbird credential with valid authorizationCode after google login with invalid locale and expects it to fail, uniqueIdentifier=TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_NumericInLocale_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_SunBirdCForGoogleLogin_SunBirdC_All_Valid_Smoke_sid_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "StayProtected", "credentialConfigurationId": "InsuranceCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "acceptLanguage": "14" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading sunbird credential with valid authorizationCode after google login with numeric in locale and expects it to fail, uniqueIdentifier=TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_SpaceInLocale_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "grantType": "authorization_code", "code": "$ID:ESignet_AuthorizationCode_SunBirdCForGoogleLogin_SunBirdC_All_Valid_Smoke_sid_code$", "redirectUri": "$INJIREDIRECTURI$", "codeVerifier": "$CODEVERIFIER$", "issuer": "StayProtected", "credentialConfigurationId": "InsuranceCredential", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "acceptLanguage": " " }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadStayProtectedIssuerCredentialWithGoogleLogin/DownloadIssuerCredential/DownloadIssuerCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Downloading sunbird credential with valid authorizationCode after google login with space in locale and expects it to fail, uniqueIdentifier=TC_Mimoto_DownloadStayProtectedIssuerCredentialWithGoogleLogin_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_FetchAllCredentials_Empty_WalletId_And_Empty_Accepted_claims_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/FetchAllCredentials/FetchAllCredentials, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get list of all credentials with empty wallet id and expects it to fail, uniqueIdentifier=TC_Mimoto_FetchAllCredentials_03 |
| Output Validation Exception |
org.testng.SkipException: known issue. Hence skipping the testcase
at io.mosip.testrig.apirig.mimoto.utils.MimotoUtil.isTestCaseValidForTheExecution(MimotoUtil.java:128)
at io.mosip.testrig.apirig.mimoto.testscripts.GetWithParamAndHeader.test(GetWithParamAndHeader.java:94)
at java.base/java.util.ArrayList.forEach(ArrayList.java:1596)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:188)
at io.mosip.testrig.apirig.mimoto.testrunner.MosipTestRunner.main(MosipTestRunner.java:108)
... Removed 23 stack frames |
| Testcase Input |
|---|
| testCaseName=Mimoto_FetchAllCredentials_Expired_Session_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "cookie": "OGYwNWI5YWQtZjg0MS00NmM2LWJiZTgtOGRmMWYwMGYzNzcy", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/FetchAllCredentials/FetchAllCredentials, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get list of all credentials with expired session and expects it to fail, uniqueIdentifier=TC_Mimoto_FetchAllCredentials_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_FetchAllCredentials_Invalid_Session_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "cookie": "invalid", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/FetchAllCredentials/FetchAllCredentials, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get list of all credentials with invalid session and expects it to fail, uniqueIdentifier=TC_Mimoto_FetchAllCredentials_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_FetchAllCredentials_Invalid_WalletId_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "invalid" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/FetchAllCredentials/FetchAllCredentials, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get list of all credentials with invalid wallet id and expects it to fail, uniqueIdentifier=TC_Mimoto_FetchAllCredentials_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_FetchAllCredentials_Space_WalletId_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": " " }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/FetchAllCredentials/FetchAllCredentials, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get list of all credentials with space wallet id and expects it to fail, uniqueIdentifier=TC_Mimoto_FetchAllCredentials_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_FetchAllCredentials_WithoutUnlock_Wallet_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_WithoutUnlock_all_Valid_Smoke_sid_walletId$" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/FetchAllCredentials/FetchAllCredentials, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get list of all credentials without unlocking wallet and expects it to fail, uniqueIdentifier=TC_Mimoto_FetchAllCredentials_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_FetchAllCredentials_all_Valid_Smoke, endPoint=/v1/mimoto/wallets/{walletId}/credentials, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "acceptLanguage": "en" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/FetchAllCredentials/FetchAllCredentials, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/FetchAllCredentials/FetchAllCredentials, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get list of all credentials saved for the wallet, uniqueIdentifier=TC_Mimoto_FetchAllCredentials_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_DownloadCredential_all_Valid_Smoke, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=download, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Download the credential saved for the wallet with credential ID, uniqueIdentifier=TC_Mimoto_ViewCredential_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_EmptyQueryParam_all_Valid, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with credential ID when action query is empty, uniqueIdentifier=TC_Mimoto_ViewCredential_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_Empty_CredentialId_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ "responseCode": "404" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with empty credential ID and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_Empty_Wallet_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ "responseCode": "404" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with empty wallet ID and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_InvalidQueryParam_all_Valid, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=invalid, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ "responseCode": "400" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with credential ID when action query as invalid, uniqueIdentifier=TC_Mimoto_ViewCredential_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_Invalid_AcceptHeader_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "invalid" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with invalid accept header and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_Invalid_AcceptLanguage_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "oo", "acceptHeader": "application/pdf" }, output={ "errorCode": "credential_fetch_error" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with invalid accept language and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_Invalid_CredentialId_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "invalid", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ "errorCode": "resource_not_found" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with invalid credential ID and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_Invalid_Wallet_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "invalid", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with invalid wallet ID and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_MultipleCredential_all_Valid_Smoke, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "$REMOVE$", "acceptHeader": "application/pdf" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the another credential saved for the wallet with credential ID, uniqueIdentifier=TC_Mimoto_ViewCredential_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_SpaceIn_AcceptHeader_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": " " }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet space in accept header and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_SpaceIn_AcceptLanguage_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": " ", "acceptHeader": "application/pdf" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with space in accept language and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_SpaceIn_CredentialId_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": " ", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ "responseCode": "400" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with space in credential ID and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_SpaceIn_Wallet_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": " ", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ "responseCode": "400" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with space in wallet ID and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_SpaceQueryParam_all_Valid, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with credential ID when action query has only space, uniqueIdentifier=TC_Mimoto_ViewCredential_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_WithExpired_Session_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "OGYwNWI5YWQtZjg0MS00NmM2LWJiZTgtOGRmMWYwMGYzNzcy", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with expired token and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_Without_AcceptHeader_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "$REMOVE$" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/error2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet without accept header and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_all_Valid_Smoke, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet with credential ID, uniqueIdentifier=TC_Mimoto_ViewCredential_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DeleteCredentials_EmptyOrSpace_CredentialId_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": " " }, output={ "errorCode":"resource_not_found" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DeleteCredentials/DeleteCredentials, outputTemplate=mimoto/error2, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Delete the credential empty or space in credential id and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteCredentials_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DeleteCredentials_Invalid_CredentialId_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "invalid" }, output={ "errorCode":"resource_not_found" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DeleteCredentials/DeleteCredentials, outputTemplate=mimoto/error2, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Delete the credential invalid credential id for the wallet and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteCredentials_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DeleteCredentials_Invalid_WalletId_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "invalid", "credentialId": "$ID:DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_All_Valid_Smoke_sid_credentialId$" }, output={ "errorCode":"invalid_request" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DeleteCredentials/DeleteCredentials, outputTemplate=mimoto/error2, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Delete the credential invalid wallet id for the wallet and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteCredentials_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DeleteCredentials_MultipleCredentialCreated_valid, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_All_Valid_Smoke_sid_credentialId$" }, output={ "responseCode": "200" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DeleteCredentials/DeleteCredentials, outputTemplate=mimoto/responseCode, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Delete the credential for the wallet with multiple credentials created, uniqueIdentifier=TC_Mimoto_DeleteCredentials_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DeleteCredentials_WithSession_Expired_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "withoutLogin", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_All_Valid_Smoke_sid_credentialId$" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DeleteCredentials/DeleteCredentials, outputTemplate=mimoto/responseCode, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Delete the credential for the wallet without login and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteCredentials_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DeleteCredentials_allReadyDeleted_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadMultipleStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_All_Valid_Smoke_sid_credentialId$" }, output={ "errorCode":"resource_not_found" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DeleteCredentials/DeleteCredentials, outputTemplate=mimoto/error2, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Delete the credential that is already deleted for the wallet and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteCredentials_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DeleteCredentials_all_Valid_Smoke, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadMultipleStayProtectedIssuerCredentialWithGoogleLogin_SunBirdC_All_Valid_Smoke_sid_credentialId$" }, output={ "responseCode": "200" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/DeleteCredentials/DeleteCredentials, outputTemplate=mimoto/responseCode, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Delete the credential that is saved for the wallet, uniqueIdentifier=TC_Mimoto_DeleteCredentials_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetWallets_WithExpiredSession_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "OGYwNWI5YWQtZjg0MS00NmM2LWJiZTgtOGRmMWYwMGYzNzcy", "cookieName": "SESSION" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/Wallet/GetWallets/GetWallets, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get list of all the wallets that is present in DB with expired login and expects to fail, uniqueIdentifier=TC_Mimoto_GetWallets_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetWallets_WithoutLogin_Neg, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "withoutLogin", "cookieName": "SESSION" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/Wallet/GetWallets/GetWallets, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get list of all the wallets that is present in DB without login and expects to fail, uniqueIdentifier=TC_Mimoto_GetWallets_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetWallets_all_Valid_Smoke, endPoint=/v1/mimoto/wallets, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ }, inputTemplate=mimoto/LoginFlow/Wallet/GetWallets/GetWallets, outputTemplate=mimoto/LoginFlow/Wallet/GetWallets/GetWalletsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get list of all the wallets that is present in DB, uniqueIdentifier=TC_Mimoto_GetWallets_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_UnlockWalletForTemporarilyLock_TemporaryLocker_IncorrectWalletPin_Neg, endPoint=/v1/mimoto/wallets/{walletId}/unlock, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "walletPin": "876532" }, output={ "errorCode": "temporarily_locked" }, inputTemplate=mimoto/LoginFlow/Wallet/UnlockWalletForTemporarilyLock/UnlockWalletForTemporarilyLock, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Unlock the wallet with incorrect wallet Pin till wallet gets temporarily locks, uniqueIdentifier=TC_Mimoto_UnlockWalletForTemporarilyLock_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DeleteWallet_AlreadyDeleted_Neg, endPoint=/v1/mimoto/wallets/{walletId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/DeleteWallet/DeleteWallet, outputTemplate=mimoto/error2, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Delete the wallet that is already deleted and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteWallet_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DeleteWallet_Empty_WalletId_Neg, endPoint=/v1/mimoto/wallets/{walletId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "" }, output={ "errorCode": "internal_server_error" }, inputTemplate=mimoto/LoginFlow/Wallet/DeleteWallet/DeleteWallet, outputTemplate=mimoto/error2, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Delete the wallet with empty wallet id and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteWallet_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DeleteWallet_ExpiredSession_Neg, endPoint=/v1/mimoto/wallets/{walletId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "OGYwNWI5YWQtZjg0MS00NmM2LWJiZTgtOGRmMWYwMGYzNzcy", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/Wallet/DeleteWallet/DeleteWallet, outputTemplate=mimoto/responseCode, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Delete the wallet with expired login session and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteWallet_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DeleteWallet_Invalid_WalletId_Neg, endPoint=/v1/mimoto/wallets/{walletId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "invalid" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/DeleteWallet/DeleteWallet, outputTemplate=mimoto/error2, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Delete the wallet with invalid wallet id and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteWallet_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DeleteWallet_Space_WalletId_Neg, endPoint=/v1/mimoto/wallets/{walletId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": " " }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/DeleteWallet/DeleteWallet, outputTemplate=mimoto/error2, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Delete the wallet with space wallet id and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteWallet_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DeleteWallet_WithoutLogin_Neg, endPoint=/v1/mimoto/wallets/{walletId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "withoutLogin", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/Wallet/DeleteWallet/DeleteWallet, outputTemplate=mimoto/responseCode, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Delete the wallet without login session and expects it to fail, uniqueIdentifier=TC_Mimoto_DeleteWallet_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_DeleteWallet_all_Valid_Smoke, endPoint=/v1/mimoto/wallets/{walletId}, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$" }, output={ "responseCode": "200" }, inputTemplate=mimoto/LoginFlow/Wallet/DeleteWallet/DeleteWallet, outputTemplate=mimoto/responseCode, restMethod=delete, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Delete the wallet that is created, uniqueIdentifier=TC_Mimoto_DeleteWallet_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_UnlockWalletAfterDelete_Neg, endPoint=/v1/mimoto/wallets/{walletId}/unlock, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "walletPin": "123456" }, output={ "errorCode": "invalid_request" }, inputTemplate=mimoto/LoginFlow/Wallet/UnlockWalletAfterDelete/UnlockWalletAfterDelete, outputTemplate=mimoto/error2, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Unlock the wallet that is already deleted and expects it to fail, uniqueIdentifier=TC_Mimoto_UnlockWalletAfterDelete_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_Logout_WithExpiredSession_Neg, endPoint=/v1/mimoto/logout, role=userDefinedCookie, templateFields=null, input={ "cookie": "OGYwNWI5YWQtZjg0MS00NmM2LWJiZTgtOGRmMWYwMGYzNzcy", "cookieName": "SESSION" }, output={ "responseCode": "404" }, inputTemplate=mimoto/LoginFlow/Authorization/Logout/Logout, outputTemplate=mimoto/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Logout the session with expired login session and expects it to fail, uniqueIdentifier=TC_Mimoto_Logout_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_Logout_WithoutLogin_Neg, endPoint=/v1/mimoto/logout, role=userDefinedCookie, templateFields=null, input={ "cookie": "abcdef", "cookieName": "SESSION" }, output={ "responseCode": "404" }, inputTemplate=mimoto/LoginFlow/Authorization/Logout/Logout, outputTemplate=mimoto/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Logout the session without creating the login session and providing random cookie value and expects it to fail, uniqueIdentifier=TC_Mimoto_Logout_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_Logout_all_Valid_Smoke, endPoint=/v1/mimoto/logout, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "responseCode": "200" }, inputTemplate=mimoto/LoginFlow/Authorization/Logout/Logout, outputTemplate=mimoto/responseCode, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Logout the session that is created, uniqueIdentifier=TC_Mimoto_Logout_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetUserProfileAfterLogout_all_Valid_Smoke, endPoint=/v1/mimoto/users/me, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/Users/GetUserProfileAfterLogout/GetUserProfileAfterLogout, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get the user profile details for the session login, uniqueIdentifier=TC_Mimoto_GetUserProfileAfterLogout_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ViewCredential_AfterLogout_Neg, endPoint=/v1/mimoto/wallets/{walletId}/credentials/{credentialId}?action=inline, role=userDefinedCookie, templateFields=null, input={ "cookie": "$ID:GoogleLoginToken_all_Valid_Smoke_sessionCookie$", "cookieName": "SESSION", "walletId": "$ID:CreateWallet_all_Valid_Smoke_sid_walletId$", "credentialId": "$ID:DownloadIssuerCredentialWithGoogleLogin_IssuerMosip_All_Valid_Smoke_sid_credentialId$", "acceptLanguage": "en", "acceptHeader": "application/pdf" }, output={ "responseCode": "401" }, inputTemplate=mimoto/LoginFlow/DownloadMosipIssuerCredential/ViewCredential/ViewCredential, outputTemplate=mimoto/responseCode, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=View the credential saved for the wallet after logout and expects it to fail, uniqueIdentifier=TC_Mimoto_ViewCredential_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_ESignet_SunBirdR_DeletePolicy_NOAUTH_Valid_Smoke, endPoint=/api/v1/Insurance/{insuranceid}, role=resident, templateFields=null, input={ "insuranceid": "$ID:ESignet_SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid_osid$" }, output={ "status": "SUCCESSFUL" }, inputTemplate=mimoto/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdR, outputTemplate=mimoto/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdRResult, restMethod=delete, regenerateHbs=false, validityCheckRequired=true, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deleting Sunbird policy with valid parameters, uniqueIdentifier=TC_Mimoto_DeletePolicySunBirdR_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetVerifierList_All_Valid_Smoke, endPoint=/v1/mimoto/verifiers, role=resident, templateFields=null, input={ }, output={ }, inputTemplate=mimoto/GetVerifierList/GetVerifierList, outputTemplate=mimoto/GetVerifierList/GetVerifierListResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving verifiers list with all valid parameters, uniqueIdentifier=TC_Mimoto_GetVerifierList_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetIssuerConfiguration_Mosip_All_Valid_Smoke, endPoint=/v1/mimoto/issuers/Mosip/configuration, role=resident, templateFields=null, input={ }, output={ "name": "MOSIPVerifiableCredential" }, inputTemplate=mimoto/GetIssuerConfiguration/GetIssuerConfiguration, outputTemplate=mimoto/GetIssuerConfiguration/GetIssuerConfigurationResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving verifiers list with all valid parameters, uniqueIdentifier=TC_Mimoto_GetIssuerConfiguration_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Mimoto_GetIssuerConfiguration_With_Issuer_Removed_From_URL_Neg, endPoint=/v1/mimoto/issuers/configuration, role=resident, templateFields=null, input={ }, output={ "errors":[ { "errorCode":"RESIDENT-APP-035" } ] }, inputTemplate=mimoto/GetIssuerConfiguration/GetIssuerConfiguration, outputTemplate=mimoto/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving verifiers list with invalid URL, uniqueIdentifier=TC_Mimoto_GetIssuerConfiguration_02 |
| Messages |